Digital threats in the context of information security and compliance.

• Examine digital threats in the context of information security and compliance.
• Examine how the internet is used for cybercrime, cyber-stalking, and other abusive behaviors.
• Discuss the various laws used to secure the USA and other countries from the threat of terror.
• Recognize the agencies responsible for the investigation of terror and warfare in online spaces.
Overview
The continuing evolution of human behavior as a result of technological innovations has created unparalleled opportunities for crime and misuse. Over the past three decades, there has been a substantive increase in the use of technology by street criminals and novel applications of technology to create new forms of crime that did not previously exist. Warfare as we know it seems to be shifting from physical to cyber warfare, with Nation states attacking each other’s technology infrastructure via the web.

  1. Traditionally, the military is equipped to handle physical war. Who is better equipped to handle cyberwarfare?
  2. On what legal grounds can a nation attack another in the context of cyberwarfare? What jurisdictional challenges do you foresee when enforcing the law when it comes to cyberwarfare?
  3. Identify and discuss four typologies of cybercrime, including what intelligence gathering might look like for these cybercrimes.
    Action Items
  4. create a post with a minimum 350 words that share the following:

    o Traditionally, the Military is equipped to handle physical war. Who is better equipped to handle cyberwarfare?
    o On what legal grounds can a nation attack another in the context of cyberwarfare? What jurisdictional challenges do you foresee when enforcing the law when it comes to cyberwarfare?
    o Identify and discuss four typologies of cybercrime, including what intelligence gathering might look like for these cybercrimes.
Our customer support team is here to answer your questions. Ask us anything!