Discussion 10 | CRJ 631 Security & Protection for Cybercrime | Ashford University
Government Cybercrime Report
For this assignment, you will take on the role of the newly appointed Special Assistant to the President of the United States on issues of cybersecurity for the White House. The President would like you to prepare a detailed report on the current state of challenges facing the United States concerning cybercrime. In the creation of this Report, it is paramount to include information in the form of peer-reviewed and/or scholarly research to support any statements made. You must research a minimum of five peer-reviewed articles and/or scholarly sources beyond those included in this course for this assignment.
In your report, please make certain to include the following headings and content.
Section One: Problems (3-4 pages)
- Describe the current nature and extent of the cybercrime problem in the United States.
- Explain the ways in which businesses and individuals are affected by cybercrime.
- Analyze the limitations of governmental investigation of cybercrime.
- Evaluate how individual and business attempts to protect against cybercrime affect investigations.
Section Two: Strategies (3-4 pages)
- Examine techniques utilized to protect potential targets of cybercrime.
- Recommend an integrated set of strategies to combat the threat of cybercrime and protect the nation’s computers and the public.
Section Three: Rationale (3-6 pages)
- Explain the basic legal rights of businesses and individuals who are affected by cybercrime.
- Evaluate the ethical and legal issues inherent to techniques used to protect potential targets from cyber criminals.
- Assess the technical issues relevant to cybercrime protection.
- Analyze the cultural issues that may impact the protection of individuals and businesses against cybercrime.
Section Four: Summary (1 page)
Provide a summary of the major issues and elements identified in the larger report with a focus on two to three key takeaways or messages.
The Government Cybercrime Report
- Must be 10 to 15 double-spaced pages 2500 to 3750 words) in length (not including title and references pages) and formatted according to APA style as outlined in the UAGC Writing CenterLinks to an external site..
- Must include a separate title page with the following:
- Title of paper
- Student’s name
- Course name and number
- Instructor’s name
- Date submitted
- Must use at least five peer reviewed and/or scholarly sources in addition to the course materials.
- Must document all sources in APA style as outlined in the UAGC Writing Center.
- Must include a separate references page that is formatted according to APA style as outlined in the UAGC Writing Center.
Brust, R. (2012). Cyberattacks: Computer warfare looms as the next big conflict in international lawLinks to an external site.. American Bar Association Journal, 98(5), 40-45.
- The full-text version of this article can be accessed through the Academic OneFile database in the UAGC Library. This article explores some of the realities and hidden dangers related to cyberattacks from an international law perspective.
Healey, J. (2011). The spectrum of national responsibility for cyberattacksLinks to an external site.. Brown Journal of World Affairs, 18(1), 57-70.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines who is responsible for cyberattacks on a national level.
- The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores the increasing external threats that companies may face from outside cyberattacks.
- The full-text version of this article can be accessed through the General OneFile database in the UAGC Library. This article explores whether HR departments and professionals are vulnerable to cyberattacks, and includes suggestions for prevention.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article discusses how credit unions can prepare for a cyberattack.
- This resource site will provide assistance in researching additional sources for the assessments within this course.