Assignment:
Question 1:
Interpretation of the Computer Fraud and Abuse Act (CFAA), and similar laws, is often up for debate due to ambiguous terminology, such as "unauthorized access." This issue has come up in several recent cases. Read the article, "The Arrest of a Florida Data Scientist Demonstrates a Weird Hole in Cybercrime Law."
• Briefly describe the case, including how the Florida Computer Crime Law and CFAA, are central to it.
• Discuss your perspective on whether the type of access Jones performed should make her guilty of unauthorized access and justify your opinion pointing to relevant components of the laws. You can also leverage the other cases presented (Briggs and Rodriguez) on both sides of this debate.
• Research and present one other case of unauthorized access that presents a conundrum for current computer security laws and discuss your opinion on the case.
Question 2:
Imagine that you have been asked to create a one-day training course that highlights the important elements of what you have learned about security access and control strategies over the past 10 weeks.
• Create a hierarchy of five of the most important topics you believe a one-day course entitled "Security Access/Control Strategies: The Essentials Presented in One Day" should address.
• Provide a detailed rationale for each of the five topics.