Week 16 Discussion — Recap For your initial post, discuss the topics in the list below. Write a couple of sentences for each. Attached is the thesis used. Q1. Why did you think it was important to study/research this topic or
Meta-Data
Week 13 Discussion – Metadata For your initial post, discuss the two topics below. Respond to posts from other students. Metadata collection Compare Government and the Private Sector policies for collecting and using metadata Describe how metadata might be used to
Drones and Mobile Computers
Week 12 Discussion – Drones and Mobile Computers For your initial post, select and discuss two topics below. Respond to posts from other students who have chosen different topics. Drones and Computers that are Mobile Describe possible legal legal and liability challenges related
Protection of Intellectual Property
Week 11 Discussion – Protection of Intellectual Property For your initial post, discuss the two topics below. Respond to posts from other students. Protection of Intellectual Property: Describe the possible effects 3-D printing may have on Copyright and Patent. How might pirated 3-D
Supply Chain Security
Week 7 Discussion – Supply Chain Security For your initial post, discuss topics below. Respond to posts for other students topics. Supply Chain Security: Describe roles and responsibilities within an organization that help assure proper security when purchasing hardware, software, and network
Motivations of Threat Actors
For your initial post, discuss all points in the two topics below. Respond to posts from other students. Motivations of Threat Actors – Analyze motivations to threat actors that can be influenced by (1) Patriotism or Regional Hegemony, (2) widespread national economic poverty, and
Week 8
Choose one of this course’s substantive weekly topics, then explain how and why the current cybersecurity-related statutes, regulations and policies related to your chosen topic developed as they did. Based on what you have learned in this course, offer your
Week 7
Judge the efficiencies (or lack thereof) of the current regulatory and policy net neutrality system that affects Americans usage of the internet. You will evaluate net neutrality through the lens of comparing and contrasting at least two such legal authorities.
Week 6
Assume that you are the chief legal administrator for a hypothetical law firm that is considering accepting cryptocurrencies from its clients for the legal services that it renders. The senior law firm partner has asked you to design and explain
Securing the Internet of Things (IoT)
Create the legal and ethical foundation for a hypothetical business that works in the IoT field so that the company can integrate such concerns into its cybersecurity framework. Pay close attention to those matters which could most closely affect the