Computer Science > QUESTIONS & ANSWERS > WGU - Digital Forensics in Cybersecurity - C840 Rated A+ (All)
WGU - Digital Forensics in Cybersecurity - C840 Rated A+ The Federal Privacy Act of 1974 ✔✔Establishes a code of information-handling practices that governs the collection, maintenance, use, an ... d dissemination of information about individuals that is maintained in systems of records by U.S. federal agencies. A system of records is a group of records under the control of an agency from which information is retrieved by the name of the individual or by some identifier assigned to the individual. The Privacy Protection Act of 1980 ✔✔Protects journalists from being required to turn over to law enforcement any work product and documentary materials, including sources, before it is disseminated to the public. Journalists who most need the protection of the PPA are those who are working on stories that are highly controversial or about criminal acts because the information gathered may also be useful to law enforcement. The Communications Assistance to Law Enforcement Act of 1994 ✔✔A federal wiretap law for traditional wired telephony. It was expanded to include wireless, voice over packet, and other forms of electronic communications, including signaling traffic and metadata. The Electronic Communications Privacy Act of 1986 ✔✔Governs the privacy and disclosure, access, and interception of content and traffic data related to electronic communications. The Computer Security Act of 1987 ✔✔Was passed to improve the security and privacy of sensitive information in federal computer systems. The law requires the establishment of minimum acceptable security practices, creation of computer security plans, and training of system users or owners of facilities that house sensitive information. The Foreign Intelligence Surveillance Act of 1978 ✔✔A law that allows for collection of "foreign intelligence information" between foreign powers and agents of foreign powers using physical and electronic surveillance. A warrant is issued by the specific court for actions under this act. The Child Protection and Sexual Predator Punishment Act of 1998 ✔✔Requires service providers that become aware of the storage or transmission of child pornography to report it to law enforcement. The Children's Online Privacy Protection Act of 1998 ✔✔Protects children 13 years of age and under from the collection and use of their personal information by Web sites. It is noteworthy that COPPA replaces the Child Online Protection Act of 1988 (COPA), which was determined to be unconstitutional. The Communications Decency Act of 1996 ✔✔Designed to protect persons 18 years of age and under from downloading or viewing material considered indecent. This act has been subject to court cases that subsequently changed some definitions and penalties. The Telecommunications Act of 1996 ✔✔Includes many provisions relative to the privacy and disclosure of information in motion through and across telephony and computer networks. The Wireless Communications and Public Safety Act of 1999 ✔✔Allows for collection and use of "empty" communications, which means nonverbal and nontext communications, such as GPS information. The USA Patriot Act ✔✔The primary law under which a wide variety of Internet and communications information content and metadata is currently collected. Provisions exist within the act to protect the identity and privacy of U.S. citizens. The Sarbanes-Oxley Act of 2002 ✔✔Contains many provisions about recordkeeping and destruction of electronic records relating to the management and operation of publicly held companies. Physical Analysis ✔✔Offline analysis conducted on an evidence disk or forensic duplicate after booting from a CD or another system. Logical Analysis ✔✔Involves using the native operating system, on the evidence disk or a forensic duplicate, to peruse the data Physical Analysis ✔✔Type of analysis looking for things that may have been overlooked, or are invisible, to the user. Logical Analysis ✔✔Type of analysis looking for things that are visible, known about, and possibly controlled by the user [Show More]
Last updated: 3 years ago
Preview 1 out of 3 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
WGU Course C840 - Digital Forensics in Cyber security Bundled Questions and Answers All Graded A+
By Nutmegs 3 years ago
$20
8
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Aug 16, 2022
Number of pages
3
Written in
All
This document has been written for:
Uploaded
Aug 16, 2022
Downloads
0
Views
108
Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·