26 Chapter 1 Cyber Environment and Security Issues
Review the case studies presented at 1. www.cybercrime.gov.
Review the statutes and laws pertaining to computer and networking crimes.2.
Research the topic of steganography.3.
Identify the various systems that are engaged in information warfare.4.
Become familiar with the functions of cryptography and cryptology.5.
Identify techniques for encryption and decryption.6.
Identify and explain threats and attacks currently active in the network.7.
Develop a case for Web ethics.8.
Describe why the network user should be concerned with content management.9.
Document any Internet horror stories personally experienced.10.
Produce a report identifying cybercrimes directed at children.11.
Identify and describe the intellectual property theft categories.12.
Search the Web for current virus attacks.13.
RESEARCH ACTIVITIES
59940_Newman_02Print.indb 26 2/6/09 11:42:24 AM

Get Computer Security: Protecting Digital Resources now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.