Legal Issues in Information Security and Incident Response
In a paper of 3-5 pages, complete the following:
- Describe at least 2 cyber crimes (e.g., viruses and hostile codes) and how they can compromise privacy and data.
- How can encryption be used to ensure integrity and maintain data privacy?
- Describe a basic encryption algorithm and how it works.
- What considerations should be taken into account for implementation?
Please prepare your report to include the following sections with the given headings and section numbers:
- (1) Abstract
- (2) Describe at least 2 cyber crimes and how they can compromise privacy and data.
- (3) How can encryption be used to ensure integrity and maintain data privacy?
- (4) Describe a basic encryption algorithm and how it works
- (5) What considerations should be taken into account for implementation?
- (6) Conclusion
- (7) References