Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

Chapter 4 of the textbook is full of requirements in cryptography and forensics that organizations need to consider. Write a paper as if your export company senior leaders have asked you to explain th

Chapter 4 of the textbook is full of requirements in cryptography and forensics that organizations need to consider. Write a paper as if your export company senior leaders have asked you to explain the legal issues of crypto and forensics - and make recommendations. Describe cryptography laws that pertain, legal considerations, and what crypto method you recommend, including key length. Discuss export laws, some countries with which you can safely do business, and what countries to completely avoid. What about your products that have crypto embedded in them? Will you need an encryption import license? Have you made sure you aren’t infringing on crypto patents? Comment on your ITAR position (feel free to make up what your product lines are). Does the state where you live have any unique crypto laws? How are you prepared to provide best digital evidence if your company gets in a legal fight? Discuss preservation and spoliation of evidence with your policies to stay out of trouble. Do you have expert witnesses on retainer? Does your state require licensed private investigators in forensics cases? Do you have private investigators working for the legal counsel? Are you safeguarding personal information collected by the biometrics tools in your cyber security program? How?There are a lot of prompts here so make sure you are responding to all of them. You don’t need to get extremely deep on each topic. Provide a high-level summary and move on to the next topic. The length of the paper is not specified; you will be graded on how thoroughly you treat each section of the assignment and for the quality of your writing. Your paper must be in APA, 7th edition format and include title and reference pages. Multiple sources are expected and they should be peer-reviewed papers or articles from reputable publications (i.e. no marketing pamphlets, wikileaks). Cite all sources including graphs, charts, and pictorials. For APA and Standard Paper Assignment Guidelines, select the "Course Resources" link in the left navigation area.

Show more
  • @
  • 150 orders completed
ANSWER

Tutor has posted answer for $10.00. See answer's preview

$10.00

****************** *** Forensics  Student ***************************** ******************************************** *** ForensicsIntroductionAs the ***** ******* ************ ********* ** *** ** *** ******* ** ***** ********* operate In ******** *** *********** and ******* ********* **** ********* new **** ** ***** *** prosecute ********* ******* ******* ********* *** such ****** ** *** *** of ************ which can be **** ** ******* *** ******* data ******* *** *** of cryptography ** not without *** ***** ********** In **** countries ************ ** heavily regulated; ** ****** ** is outright ****** **** *** **** it ********* for ********* ** ******* internationally if **** need ** use ************ ** protect ***** **** ******* Iyengar ***** ********** ***** ** ******** ********* *** *** cryptography ** hide ***** activities **** law *********** **** ***** ** ********* for ********* ** be ***** ** *** ***** ************ ** ***** ************ and ** **** steps to ****** **** their data ** protectedPart ************* ** *** practice ** secure ************* ** *** ******** of third ******* ************ ** **** ** ******* ************ ********* ***** file ******* *** ****** communications ***** *** * variety ** ************* ********** **** can ** **** ** protect **** The most ****** cryptographic ********** * recommend to my company include ************* ********** which *** the same key ** encode *** ****** **** *** ************** algorithms which *** ********* **** to ****** and ********* **** ***** *** also **** ** **** ************ ******* ** ** ******** key ****** ** ** important ************* **** ******** * ************* ********* ******* ***** A ****** key ****** ** **** ****** but **** **** *************** ********* *** key ****** should ** ******** ***** ** *** sensitivity ** *** data ***** ********* *** *** ********* ********* The *** ****** ** an important ************* **** ******** * cryptographic ********* because it determines the ******** ** *** ********** * ****** *** ****** is more ****** but **** **** *************** ********* *** *** ****** ****** ** chosen ***** ** *** sensitivity ** the data ***** ********* *** *** ********* ********* For ******* ** our ******* encrypts sensitive ********* *********** ** **** *** * **** robust encryption algorithm **** a ****** key ****** ******* if the company ******** ***** ********* **** ** *** *** a **** ****** algorithm with * ******* *** ********* ******* ****** be ***** ** the ***** ************ ** ***** ************ **** ******** knowing which ********* have *********** ** **** ** place *** understanding *** criminals *** *** ************ ***** *** * *** ******** ***** ************ *** ********* **** *** ************ **** **** ****** ** ***** ** The ***** is that ************ ** ********* ** **** ********* ** companies should **** ***** ********* **** *********** or bans The ****** is **** criminals *** *** ************ to **** their ****** so ********* should be ***** ** *** criminals ***** *** ** ******* et ** ***** ******* companies should **** ** ***** ** *** ********* for ********** ************ **** using cryptography ** this *** have ******** ************ *** privacy *** securityThe ******* ****** **** ***** ** ****** that *** **** is protected **** ******** ******** *********** ************* algorithms *** keys Some ******** measures **** *** ******* can take to ********* *** ******** ** ***** **** ****** Choose *********** ************* ********** *** *** ******** **** includes selecting ********** ********* ** ***** attacks and using key lengths sufficient to ******* ******* brute ***** ********* ********* ******** measures: This ******** ********* *** intrusion ******************** systems ** **** as ******** **** all ******** ** ** to **** **** the ****** ******** ********** ******* employees: ********* should be ******* on security ********** *** ******** *** be ***** ** *** ********** ** ******* **** secure Lengths ** well as ************ ******** ***************** should ******** ***** *********** methods ** **** ********** This ******** ******** methods **** are **** ****** ** ** **** ** ********* **** ** physical ******** ******** ***** *** ******* *********** ******* ** **** ********** **** ********* can ******** ***** ***** include ******** security ******** such ** ******** ******* and access control systems *** ************* ********** **** as **** encryptionPart 2There are * ******* ** ****** ******* laws **** **** from ******* ** ******* Companies **** ** ** ***** ** *** ****** control **** ** the countries **** *** ***** ******** **** ******* ** comply with ***** **** *** result ** ****** ********* ********* prison ********* **** ********* have ********* ****** ******* **** *** companies **** ****** special licenses to export ***** products ***** ********* **** **** stringent regulations *** companies *** only **** ** register their ******** **** the ********** ***** ******** with ********* with **** strict export ******* **** ** generally **** ******* ********* should ***** doing ******** with ********* that **** strict ****** ******* **** ** that *** known ** ** ********** ********* organizationsi ****** ******* ********** control **** *** designed to ******** *** ****** ** ***** *** ************ **** could ** used *** ******** ** ********* ******** These laws **** **** ******* to country making ** ********* *** ********* ** ******* internationally (Export Solutions (nd) **** ********* **** ********* export ******* **** and ********* **** ****** ******* ******** ** export their ******** ***** ********* **** **** stringent *********** *** ********* *** **** need ** register ***** products **** *** government **** countries **** **** ****** ****** ******* **** ******* Canada the ****** ******* and Australia Countries **** **** ****** export ******* laws ** **** are ***** ** ** ********** ********* ************* ******* Iran North Korea *** ********* you **** sure *** ******** ********** ** ****** patents?Our ******* *** ******* ** ** *** ********** ** crypto patents ** ********* **** ** *** * license from the relevant ****** holders ************ ** * ************ ******* that **** ************ ********** ** encode *** ****** **** ******* ***** ******* these ********** Companies that *** ************ ** ***** ******** may ******* * ******* from the patent ****** (Hasan ** ** 2021) ******* ** ****** a ****** can ****** ** a company being sued for ****** ************ Patent ************ lawsuits *** ** **** ****** *** ****** * company's ************** about **** products **** **** ****** ******** ** ***** Will *** **** ** encryption ****** license?Products **** **** ************ ******** ** them may ******* ** ********** ****** ******* **** depends ** *** ******* ** which *** ******* will be ******** ********* **** different regulations ********* *** ****** ** products **** ******* ************ **** ********* **** stringent ***** ********* the ****** of ******** **** ******* cryptography In ***** countries ** encryption import license *** ** required ** import the ******* legally ***** countries **** **** strict *********** ** ** ********** import ******* may *** ** ****** ** ***** ********* positionOur product ***** ******* ******** **** uses cryptography *** ******** **** ** ******** to be **** with ************* software; *** ******* ***** ********* DiskCryptor TPM ***** *** ************* ****** *** Hardware security modules *** products are subject ** **** *********** ** *** ********** **** the ** ***** ********** *** **** obtained *** ********* ******** *** ************* ******* ** **** Regulations ****** ** * *** of ** ****** ******* **** that ******** *** ****** ** defense-related ***** and ************ ***** regulations *** ******** ** ******* *** ************* ** ******* of **** *************** 3Does *** ***** ***** *** **** **** *** ****** crypto laws? ********** my *** **** **** regulate the *** of ************ ***** **** vary **** state ** ***** *** *** **** ** ********* *** companies ** operate ** ******** conditions ** **** ****** *** *** of ************ is ******* ********* In ****** the *** ** ************ ** ******** ****** **** *** make ** ********* *** ********* ** operate *************** ** **** **** to *** ************ ** ******* their ****** addition criminals can *** ************ ** **** their ********** from *** *********** This ***** it ********* for ********* to ** ***** ** *** ***** ************ ** using cryptography *** to **** ***** ** ****** **** ***** **** ** protected (Dorothy ** al ******** *** you ******** to ******* *** **** ******* ******** ** your ******* gets ** * ***** ****** explainIf *** ******* **** ** *** **** a legal ***** we would ** prepared ** ******* ******* ******** ** ****** a policy for ********** ********** and analyzing ******* ******** **** ***** ****** that *** ******** ** ************* managed *** maintained *** *** ** **** ** ***** ** would also **** ***** ** ******* ******* ********** intentional or ********** ********** **** would ****** **** the ******** is *** destroyed ** ******* *** *** be **** ** ***** or ******** * ******* eventDiscuss ************ *** ********** ** ******** **** **** ******** ** stay *** of trouble ********** ********* ******** ********* *** ************ *** spoliation ** ******** *** ******** to ****** **** evidence ** ******** collected *** ********* *** **** ** ** *** ********* ** ******* These ******** **** ** ensure **** ** *** provide *** best ******** ******* ***** ** the event ** a legal ********* *** *** **** ****** ********* on retainer?Our ******* ******* ** ****** ****** ********* ** * ********* or ******** ***** This ****** ** to ****** ****** ********* **** ** **** **** without ****** ** *** *** ***** ********* services Retaining expert ********* part-time or ** retainer *** ** * ******** ********** for ********* Expert witnesses can ******* valuable ********* ** ***** ***** can ***** make *** ********** ******* ******* *** losing a ******** **** ***** ******* licensed private ************* ** forensics ********* ***** does not ******* ******** ******* ************* ** forensics cases ******* ** believe **** ********* a ******** ******* investigator *** be * ******** investment ******* ************* can ***** ******* ******* information *** ********* ** court ***** *** **** benefits to ****** a ******** private ************ ** forensics ***** ******* investigators *** ******* in ********** ************** *** gathering evidence **** *** ***** ******* valuable *********** *** testimony in ***** ** ******** ******* investigators *** **** ******* *** families ** ********* cases by ********* ******* *** ******** ******* *** ***** ********* you **** ******* ************* working *** *** legal ******** We ** *** **** private ************* ******* for *** legal ******* ******* ** ******* **** ********* * ******** ******* ************ *** be * valuable ********** ******* ************* *** often ******* ******* *********** *** ********* ** court ***** are **** benefits to ****** a ******** ******* ************ ******* ************* *** often ******* valuable *********** *** ********* ** court **** can **** **** to locate ********* gather ******** and ******* ************ ** ******** ******* ************* *** provide ********** *** ******** for your ****** *** *********** *** safeguarding personal information collected ** the ********** ***** in **** ***** ******** ********** *** ************ *** ******** *********** ********* ** *** ********** ***** ** *** ***** ******** ******* ********* et ** 2019) ** have *********** ******** ******** ** ******* **** **** *** we have * ****** *** destroying this data **** ** ** ** ****** ****** ***** *** * ******* ** **** ** safeguard ******** *********** ***** *** ******* ways to protect ******** *********** ********* ********** ****** ******* *** **** *********** policies ********** is * ******* ** transforming ******** **** into ** ********** format **** makes ** difficult for unauthorized *********** ** ****** the **** ****** ******* ** * security ******* ******** data ****** ** authorized *********** **** *********** ******** ******* **** *** how data should ** ********* ** ******* unauthorized accessReferencesBrown M ***** C ***** **** * ************ ** ForensicsDorothy ***** ** William * ***** Denning ****** ****** ****** ** Cyberspace Nps Retrieved ******* 4 2022 **** ***************************************************************** ********* **** International ***** Administration | Tradegov Retrieved ******* * **** from https://wwwtradegov/export-solutionsHasan * K ****** * Islam * Pandey * Baker El-Ebiary Y * **** N S ***** ****** * * (2021) *********** ************* ********** *** ******** ****** ********** ** ******* ******** ** ****** ************ ********** ********** * ******* * & ********** * ****** Digital ********* ************ with ***** ************ ** Cybersecurity *** 83-102) *** *********** Z * Soewito * Witjaksono * ***** *********** * ****** * review of ********** ** ************* hash function **** ** ******* ******** ***** Procedia computer ******* *** 381-392Rivest R * (1994 ********* The *** ********** algorithm In International Workshop ** Fast ******** ********** *** ****** ******** Berlin HeidelbergStaunton * Adams * ***** * **** * S **** * Labuschaigne * ***** De ***** * ****** ************ *** ****** ** ******* ******** in ***** Africa: ***** consent *** *** Protection ** ******** *********** Act ** * ** **** ***** ***** ******* ******* Journal ****** *********

Click here to download attached files: cryptography and forensics.doc
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question