ITN 267 Assignment 9

  

1. Why do we need Intellectual Property Law?

2. Compare and contrast patents, trademarks, copyrights, and trade secrets in detail.

3. How do you protect inventions internationally? Copyrights internationally?

4. What is a patent troll?

5. Explain a strong versus weak trademark.

6. Summarize the ACPA.

7. Define fair use. How does the concept of fair use affect owner’s rights?

8. Describe the highlights of the DCMA and its provisions.

9. Explain why Napster was not able to hide behind the DCMA.

10. What are the implications (financial, business, legal) of online music sharing services?

Discussion – Information Governance

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References:

 

Calderaro, A., & Craig, A. J. S. (2020). Transnational governance of cybersecurity: policy challenges and global inequalities in cyber capacity building. Third World Quarterly, 41(6), 917–938. https://doi.org/10.1080/01436597.2020.1729729

Setyadi, R. (2019). Assessing Trust Variable Impact on the Information Technology Governance Using Business-IT Alignment Models: A Model Development Study. 2019 International Conference on Sustainable Engineering and Creative Computing (ICSECC), Sustainable Engineering and Creative Computing (ICSECC), 2019 International Conference On, 218–222. https://doi.org/10.1109/ICSECC.2019.8907224

information and network security

  

Learning Objectives and Outcomes

  • Apply Payment Card Industry Data      Security Standard (PCI DSS) to a small- to medium-sized business.

Assignment Requirements

Lion Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Lion Media has stores in several cities across the U.S. and is planning to bring its inventory online. The company will need to support a credit card transaction processing and e-commerce website.

For this assignment:

  1. Obtain a copy of the latest PCI      DSS standards document from the PCI Security Standards website. The latest      standards document is typically in the document library. (Search for it on      the given link)
  2. Write a report detailing what Lion      Media must do when setting up its website to maintain compliance with PCI      DSS.
  3. Address all 6 principles and 12      requirements in your report.

Required Resources

  • Course textbook
  • Internet access
  • https://www.pcisecuritystandards.org/

Submission Requirements

  • Format: Microsoft Word (or      compatible) 
  • Font: Arial, size 12, double-space      
  • Citation Style: Any
  • Length:      3–4 pages

Self-Assessment Checklist

· I created a detailed plan for creating a PCI DSS-compliant website.

· I addressed all 6 principles and 12 requirements of the PCI DSS.

  • I created a professional, well-developed report with      proper documentation, grammar, spelling, and punctuation.
  • I followed the submission      requirements
  • I      did NOT plagiarize 

Business/Organizational Description

 

Select an area of industry that you are interested in and create a hypothetical business.

Then, complete the “CYB-690 Business Profile.”

Students may adapt their hypothetical business developed in CYB-630 or CYB-650 for this assignment.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Business/Organizational Description Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Pick a network address from the list below

  

Pick a network address from the list below. Everybody must pick a unique network address and number of subnet. Please reply to the Subnetting Discussion Topic under Week 3 Discussions with your selection. Don’t select a network address that somebody else already selected.

For each of them, I need the following information:

Chosen. 179.85.0.0/16 subnetted to 111 subnets and provide information for subnets #1, #9, #59, and #111

 
 

· The new subnet mask after the subnetting (10%)

 
 

· The following information for the four subnets identified:

 
 

 
 

o Subnet’s network address (3%)

 
 

o Subnet’s broadcast address (3%)

 
 

o Subnet’s range of available IP addresses (4%)

 
 

· The calculations on how you get to the answers (50%). This is very important. If you don’t provide the calculations or the way you get the answer, you will lose 50%.

 
 

Your goal is to subnet them with as little subnet as possible but still meeting the requirement. In other word, maximize the number of hosts that is available for each subnet.

Cryptography

Section 1 

Using the Internet and/or the Library, research and complete the following: 

In 1,000 words or more words, respond to the following: 

Explain how Active Directory implements PKI. Be sure to detail the use of certificates, the use of keys, and key security. 

Section 2 

In 200 or more words for each answer, respond to the following: 

  • Give an example of a protocol that uses both public key and private key cryptography and explain how and why it does so.
  • How are the public key and private key of an asymmetrical key set related? What about this relationship makes it a “one-way” process? 

Project Report

Your final project is the culmination of the work you have done using your data throughout this course. The report should include the following sections:

  • Introduction (one to two pages)
  • Data (two to three pages)
  • Methods (one page)
  • Analysis (two to five pages)
  • Conclusion (one to two pages)
  • Appendix (no limit)

IoT and Social Media

 Although uniquely compliant with current law and guidance, is the collection and aggregation of data from the IoT and social media an ethical use of data. In 750-1,250 words, explain your opinion with supporting evidence. Make sure to address:

  1. How has the IoT and social media been affected by cybersecurity over time?
  2. Acceptable Use Policy. Although users agree to the conditions of it, is the data being collected used for entirely ethical purposes?
  3. User Agreement. If you use something that is provided for free, how does a company make a profit (e.g., how are free products and services monetized)?
  4. If companies build security directly into IoT devices before implementing the hardware into the system, the security would be sounder and could be tested ahead of time, instead of building security around the device as an afterthought. Suppose that you are one of the executive members in the company and face this option. However, the built-in security would cost three times higher than the regular without built-in security. Provide your rationale of the decision in light of the Christian worldview.

Essay on Block chain implementation in Military or education

 

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles.    Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.