RANSOMWARE
1. INTRODUCTION 1. DEFINE TOPIC/THEME/PLACE/TIME & IDENTIFY KEY TERMS AND TERMINOLOGY 2. EXPLAIN KEY ISSUES AND REASON FOR THE STUDY 3. IDENTIFY PERTINENT LEGAL ISSUES 4. IDENTIFY RELEVANT ADMINISTRATIVE/POLITICAL BARRIERS/ETHICAL CONSIDERATIONS 1. RETROSPECTIVE ANALYSIS 2. IDENTIFY THE 1ST LEGAL CASE OR STATUTE OR PUBLIC CONTROVERSY ASSOCIATED WITH THE TOPIC 3. EXPLAIN PERTINENT HISTORICAL ISSUES, TRENDS OR FORCES WHICH EXPLAIN THE DEVELOPMENT OR EVOLUTION OF TOPIC, I.E., HOW DID THE LEGAL DILEMMA UNFOLD 1. DISCUSS HISTORICAL CONTEXT AND DISCUSS ITS ACTUAL CONTRIBUTIONS AND DISCUSS HOW SIMILAR OR DISSIMILAR IT IS TO CURRENT THINKING III. CURRENT STATE OF THE LAW 1. IDENTIFY THE MOST CURRENT THINKING ON THE ISSUE AS SUPPORTED BY RESEARCH OR CASELAW 2. EXPLAIN CURRENT ISSUES, TRENDS, OR FORCES THAT INFLUENCE TOPIC TODAY/NOW 1. CONTRAST THE CURRENT ISSUES, TRENDS, OR FORCES TO THOSE OF THE PAST 1. DEMONSTRATE AN UNDERSTANDING OF IMPORTANT TERMINOLOGY, CONCEPTS, PRINCIPLES AND THEORIES ASSOCIATED WITH CYBERSECURITY, LAW AND PUBLIC POLICY. DEFINE, EXPLAIN AND RELATE EACH TO YOUR TOPIC/THEME/PLACE/TIME. 1. CONSTITUTIONAL LAW 2. RELEVANT STATE/FEDERAL STATUTE AFFECTING YOUR TOPIC 3. RELEVANT CASE LAW SETTING PRECEDENT AFFECTING YOUR TOPIC 1. PROVIDING OPTIONS/SOLUTIONS FROM A CYBERSECURITY LAW AND POLICY PERSPECTIVE. 2. IDENTIFY POTENTIAL OPTIONS AND SOLUTIONS ADDRESSING YOUR TOPIC 3. DISCUSS THE ADMINISTRATIVE/POLITICAL BARRIERS/ETHICAL CONSIDERATIONS AND COMPARE/CONTRAST THEM BEFORE MAKING RECOMMENDATIONS TO ADDRESS THE TOPIC WITH BEST PRACTICE SOLUTIONS. REFERENCES THAT NEED TO BE USED https://www.dhs.gov/sites/default/files/publications/Ransomware%20and%20what%20to%20do%20about%20it.pdf https://www.malwarebytes.com/ransomware/ https://www.pcmag.com/roundup/353231/the-best-ransomware-protection https://www.ic3.gov/complaint/splash.aspx https://pdf.ic3.gov/Ransomware_Trifold_e-version.pdf
Leave a Reply
Want to join the discussion?Feel free to contribute!