Question Details

(Solved) TFT2: Task 4 TFT2: Task 4 Articulation of Response (clarity,


HI Can you please help me with My TFT task 4 Cyber law see the attached file for more detail i got it back from evaluator . Please finish it for me in one or two day i have very less time. Do not accept if you dont know what to answer.


TFT2: Task 4

 


 

TFT2: Task 4

 

Articulation of Response (clarity, organization, mechanics)

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate provides

 

unsatisfactory

 

articulation of response.

 


 

The candidate

 

provides weak

 

articulation of

 

response.

 


 

The candidate

 

provides limited

 

articulation of

 

response.

 


 

The candidate

 

provides adequate

 

articulation of

 

response.

 


 

The candidate

 

provides

 

substantial

 

articulation of

 

response.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - The tone of the work is enhanced by the

 

inclusion of topic-related vocabulary. A number of concerns are evident related to sentence

 

fluency, word choice, and conventions. Examples include sentence structure, omitted

 

words, word forms, subject/verb agreement, and punctuation. Additionally, the organization

 

of the work makes it difficult to determine the author?s intended response to some of the

 

assessment prompts (e.g., paragraphing, supporting details).

 

A1. Laws or Regulations

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

discussion of how 2 laws

 

or regulations apply to

 

the case study.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

no support, of

 

how 2 laws or

 

regulations

 

apply to the

 

case study.

 


 

The candidate

 

provides a logical

 

discussion, with

 

limited support, of

 

how 2 laws or

 

regulations apply

 

to the case study.

 


 

The candidate

 

provides a logical

 

discussion, with

 

adequate support, of

 

how 2 laws or

 

regulations apply to

 

the case study.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

substantial

 

support, of how

 

2 laws or

 

regulations

 

apply to the

 

case study.

 


 

Criterion Score: 1.00

 

Comments on this criterion: 10/15/2015 - The submission identifies the Electronic Fund

 

Transfer Act and the Identity Theft and Assumption Deterrence Act. It is not clear how

 

identity theft is applicable to the scenario as only credentials were taken, not identifying

 

documents of the customers. Please revise to identify two specific laws and include full

 

explanation for how they apply to the crime in the scenario.

 

A1a. Legal Jurisdiction

 

(0) Unsatisfactory

 


 

(1) Does Not

 


 

(2) Minimally

 


 

(3) Competent

 


 

(4) Highly

 


 

TFT2: Task 4

 

Meet

 

Standard

 

The candidate does not

 

provide a logical

 

discussion of how VL

 

Bank will work within the

 

parameters of

 

appropriate legal

 

jurisdiction with specific

 

bodies of law

 

enforcement to resolve

 

the situation.

 


 

Competent

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

no support, of

 

how VL Bank

 

will work within

 

the parameters

 

of appropriate

 

legal jurisdiction

 

with specific

 

bodies of law

 

enforcement to

 

resolve the

 

situation.

 


 

The candidate

 

provides a logical

 

discussion, with

 

limited support, of

 

how VL Bank will

 

work within the

 

parameters of

 

appropriate legal

 

jurisdiction with

 

specific bodies of

 

law enforcement

 

to resolve the

 

situation.

 


 

Competent

 


 

The candidate

 

provides a logical

 

discussion, with

 

adequate support, of

 

how VL Bank will

 

work within the

 

parameters of

 

appropriate legal

 

jurisdiction with

 

specific bodies of

 

law enforcement to

 

resolve the

 

situation.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

substantial

 

support, of how

 

VL Bank will

 

work within the

 

parameters of

 

appropriate

 

legal

 

jurisdiction with

 

specific bodies

 

of law

 

enforcement to

 

resolve the

 

situation.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - The response states that the bank will need to

 

get help from the FBI. Additional discussion is needed to explain the legal jurisdiction of the

 

crime in the scenario and discuss how the bank will work with the FBI to resolve the

 

situation.

 

A1b. Legal Considerations

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

discussion of legal

 

considerations for

 

preparing the digital

 

evidence VL Bank will

 

need to provide law

 

enforcement and

 

attorneys.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

no support, of

 

legal

 

considerations

 

for preparing

 

the digital

 

evidence VL

 

Bank will need

 

to provide law

 

enforcement

 

and attorneys.

 


 

The candidate

 

provides a logical

 

discussion, with

 

limited support, of

 

legal

 

considerations for

 

preparing the

 

digital evidence VL

 

Bank will need to

 

provide law

 

enforcement and

 

attorneys.

 


 

The candidate

 

provides a logical

 

discussion, with

 

adequate support, of

 

legal considerations

 

for preparing the

 

digital evidence VL

 

Bank will need to

 

provide law

 

enforcement and

 

attorneys.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

substantial

 

support, of legal

 

considerations

 

for preparing

 

the digital

 

evidence VL

 

Bank will need

 

to provide law

 

enforcement

 

and attorneys.

 


 

Criterion Score: 1.00

 

Comments on this criterion: 10/15/2015 - The submission provides a high level

 

response that recommends that the data remain unchanged and procedures should be

 

documented. This aspect needs discussion of specific considerations for preparing and

 


 

TFT2: Task 4

 

handling digital evidence to ensure it is admissible in court. Please revise to fully discuss

 

these specific considerations.

 

For instruction on the legal considerations, please revisit the section titled Jurisdiction in

 

Cyberspace in the study plan for this course by following this

 

link: https://cos.wgu.edu/student/course/25920/activity/66053.

 

A1c. Coordination

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

explanation of what

 

coordination should take

 

place between the CISO

 

and VL Bank?s lawyer.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with no detail,

 

of what

 

coordination

 

should take

 

place between

 

the CISO and VL

 

Bank?s lawyer.

 


 

The candidate

 

provides a logical

 

explanation, with

 

limited detail, of

 

what coordination

 

should take place

 

between the CISO

 

and VL Bank?s

 

lawyer.

 


 

The candidate

 

provides a logical

 

explanation, with

 

adequate detail, of

 

what coordination

 

should take place

 

between the CISO

 

and VL Bank?s

 

lawyer.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with substantial

 

detail, of what

 

coordination

 

should take

 

place between

 

the CISO and VL

 

Bank?s lawyer.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - The response briefly discusses evidence

 

transferring between the bank and FBI. Please revise to provide an explanation of specific

 

coordination between the CISO and VL Bank's lawyer.

 

A2. Cybercrime Effects

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

discussion of how the

 

cybercrime could affect

 

VL Bank?s enterprise

 

continuity.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

no support, of

 

how the

 

cybercrime

 

could affect VL

 

Bank?s

 

enterprise

 

continuity.

 


 

The candidate

 

provides a logical

 

discussion, with

 

limited support, of

 

how the

 

cybercrime could

 

affect VL Bank?s

 

enterprise

 

continuity.

 


 

The candidate

 

provides a logical

 

discussion, with

 

adequate support, of

 

how the cybercrime

 

could affect VL

 

Bank?s enterprise

 

continuity.

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 

substantial

 

support, of how

 

the cybercrime

 

could affect VL

 

Bank?s

 

enterprise

 

continuity.

 


 

Criterion Score: 1.00

 


 

TFT2: Task 4

 

Comments on this criterion: 10/15/2015 - Discussion of the potential for lost business is

 

included. The full impact of the crime on the bank's enterprise continuity is not clear in the

 

response. Please revise to explain how the crime could impact the bank's overall enterprise

 

continuity.

 

For instruction on the cybercrime effects, please revisit the section titled Enterprise

 

Continuity in the study plan for this course by following this

 

link: https://cos.wgu.edu/student/course/25920/activity/66032.

 

A2a. Technology

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

explanation of how VL

 

Bank could use

 

technology to prevent

 

the cybercrime in the

 

case scenario.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with no support,

 

of how VL Bank

 

could use

 

technology to

 

prevent the

 

cybercrime in

 

the case

 

scenario.

 


 

The candidate

 

provides a logical

 

explanation, with

 

limited support, of

 

how VL Bank could

 

use technology to

 

prevent the

 

cybercrime in the

 

case scenario.

 


 

The candidate

 

provides a logical

 

explanation, with

 

adequate support, of

 

how VL Bank could

 

use technology to

 

prevent the

 

cybercrime in the

 

case scenario.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with substantial

 

support, of how

 

VL Bank could

 

use technology

 

to prevent the

 

cybercrime in

 

the case

 

scenario.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - The response discusses implementation of

 

multi-factor authentication and the use of anti-virus. As per the case study: MFA is already

 

in place as well as digital certificates. It is not clear how the bank could enforce customers

 

to use antivirus. This aspect needs discussion for how the bank could use specific

 

technology to prevent the crime in the scenario.

 

For instruction on the technology, please revisit the section titled Enterprise

 

Continuity in the study plan for this course by following this

 

link: https://cos.wgu.edu/student/course/25920/activity/66032.

 

A3. Controls

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

discussion of

 

information security and

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 


 

The candidate

 

provides a logical

 

discussion, with

 

limited detail, of

 


 

The candidate

 

provides a logical

 

discussion, with

 

adequate detail, of

 


 

The candidate

 

provides a

 

logical

 

discussion, with

 


 

TFT2: Task 4

 

assurance controls that

 

could mitigate future

 

attacks of this kind at VL

 

Bank.

 


 

no detail, of

 

information

 

security and

 

assurance

 

controls that

 

could mitigate

 

future attacks

 

of this kind at

 

VL Bank.

 


 

information

 

security and

 

assurance controls

 

that could mitigate

 

future attacks of

 

this kind at VL

 

Bank.

 


 

information security

 

and assurance

 

controls that could

 

mitigate future

 

attacks of this kind

 

at VL Bank.

 


 

substantial

 

detail, of

 

information

 

security and

 

assurance

 

controls that

 

could mitigate

 

future attacks

 

of this kind at

 

VL Bank.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - A specific response to this task aspect could

 

not be located in the submission. Please revise to discuss controls that the bank could

 

implement that would mitigate future attacks.

 

A3a. Alignment

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

The candidate does not

 

provide a logical

 

explanation of how the

 

controls align to

 

regulatory requirements

 

and standards.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with no support,

 

of how the

 

controls align to

 

regulatory

 

requirements

 

and standards.

 


 

The candidate

 

provides a logical

 

explanation, with

 

limited support, of

 

how the controls

 

align to regulatory

 

requirements and

 

standards.

 


 

The candidate

 

provides a logical

 

explanation, with

 

adequate support, of

 

how the controls

 

align to regulatory

 

requirements and

 

standards.

 


 

The candidate

 

provides a

 

logical

 

explanation,

 

with substantial

 

support, of how

 

the controls

 

align to

 

regulatory

 

requirements

 

and standards.

 


 

Criterion Score: 0.00

 

Comments on this criterion: 10/15/2015 - A specific response to this task aspect could

 

not be located in the submission. Please revise this along with section A3.

 

B. Sources

 

(0) Unsatisfactory

 


 

(1) Does Not

 

Meet

 

Standard

 


 

(2) Minimally

 

Competent

 


 

(3) Competent

 


 

(4) Highly

 

Competent

 


 

When the candidate

 

uses sources, the

 

candidate does not

 

provide in-text citations

 

and references.

 


 

When the

 

candidate uses

 

sources, the

 

candidate

 

provides only

 

some in-text

 


 

When the

 

candidate uses

 

sources, the

 

candidate provides

 

appropriate in-text

 

citations and

 


 

When the candidate

 

uses sources, the

 

candidate provides

 

appropriate in-text

 

citations and

 

references with

 


 

When the

 

candidate uses

 

sources, the

 

candidate

 

provides

 

appropriate in-

 


 

TFT2: Task 4

 

citations and

 

references.

 


 

references with

 

major deviations

 

from APA style.

 


 

minor deviations

 

from APA style.

 


 

text citations

 

and references

 

with no readily

 

detectable

 

deviations from

 

APA style, OR

 

the candidate

 

does not use

 

sources.

 


 

TFT2: Task 4

 

Event Happened at VL Bank:

 

CIO at VL bank is notified by commercial customers that there was unauthorized wire transfer

 

with greater amount then 290,000$. As CIO we take pride in our information security and it is

 

very concerning.

 

After we got notified we quickly started to perform investigation with Information security team

 

along with network engineer on how such attack had occurred. We ran in to logs and audits and

 

figured out that the data was not stolen it was accessed using appropriate credentials.

 

Once we figured out that no attack has occurred on our network we started to investigate with

 

customers as our next step and checked their personal computers and other mobile devices that

 

they use to login to their account. Finally we discovered that all information was collected from

 

customer with a virus attack called key-logging which collected customer username, password

 

and account numbers and Digital certificated and all other relevant information.

 

The customer also had no antivirus software installed to protect them against viruses and attacks.

 

The Customers were receiving fake emails as phishing attack to click on links to install updates

 

to fix security issues with their account.

 

Customers reported VL Bank immediately about find transfer with in forty eight hours and they

 

all are protected under electronic Fund Transfer act. The act states that if the fraudulent wire

 

transfer is reported on time then the customer will not be responsible for any amount. If customer

 

reported within two business days then customer will be charged 50$ of total amount which is

 

transferred. If customers reported with 3 to 59 date then they will have to pay up to 500$ and if

 

reported in two months or 60 days then the customer will have to pay the entire amount.

 

Customers reported within 48 hours that?s why they will only be charged 50$.

 

Based on crimes and criminal law tile 18 and part1, chapter, § 1028 "Fraud and related activity in

 

connection with, authentication features, identification documents and information?. Phishing

 

emails is a violation of law.

 

There has been attempts in past to pass and introduce that law that specifically applies to

 

phishing attempt none of these laws made it on the books.

 

Identity Theft and Assumption Deterrence Act is a federal law established in 1998 that protects

 

people from identity theft. Prior to this date there were not any specific laws to address this issue.

 

The definition on the Federal Trade Commission?s website reads. ?knowingly transfers or uses,

 

without lawful authority, a means of identification of another person with the intent to commit,

 

or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that

 

constitutes a felony under any applicable State or local law;?

 

The crime will be considered as federal as it is performed outside of Georgia so we will have to

 

report and get help from FBI.

 

In past collecting digital data was very easy just grab and go but later it changed with not a good

 

technique. When dealing with digital data it is important to be careful and make sure it?s not

 

changed when transferring. Evidence should only be collection by someone who is trained and

 

professional to ensure that the data is not changed and damaged.

 

When collecting the data the procedures should be documented and then review is important as

 

next step. CIO will have to concentrate of information required by FBI.

 

- The customer name, account numbers and the information about computer the used to access

 

VL bank website.

 


 

TFT2: Task 4

 

- List of all fraud transactions including information about the bank they send to public IP

 

address of the computer , the amount transferred, Date and time that fraud transaction done.

 

All information will be documented, collected and then submitted to VL Bank lawyers by me.

 

They will then catalog the evidence and send it FBI. We will try our best to give them as much

 

information we can and coordinate with federal authorities.

 

As FBI investigation starts and news outlets reports the business can be then in risk to continue

 

even if this did not happen due to weak information security system at VL bank. If customers

 

start not trusting us we will then lose customers. The cost of lost business was the biggest effect

 

of a breach. We will have to plan and take step to minimize the risks.

 

We will then start advertising how secure our system is and what technologies are in use to

 

defend customers from threats coming from internet. We will give them multi-factor

 

authentication and give them recommendation to keep their account secure and we will use

 

digital certificates. We will not change anything in our current procedures but will inform and

 

make all users aware of it.

 

We will start implementing new security technologies and keep our system up to date to protect

 

VL bank network. We will educate customers on how they can protect their self from phishing

 

attacks and how they need to keep their self-secure. The training will also include how to keep

 

their computer safe and clean from viruses.

 

We will require all our users to install antivirus application before continuing to access VL Bank

 

website and also require them to use username and password. This would increase the detection

 

possibilities of a key logging program prior to logging into the web site, thus not losing the

 

information.

 

We will implement multi factor authentication. Customers will required to add their picture and

 

select photo and customer will be required to identify the photo with mouse click before making

 

any transaction.

 

By implementing all of mentioned security control it will provide us strong information security

 

system and will meet standards set by privacy act. As banking institution we need to make sure

 

that customers? accounts are protect and safe. It will help us to keep our self and customers up to

 

date and be one step ahead then the hacker.

 

References

 

Technology News, Analysis, Comments and Product Reviews for IT Professionals. (2009,

 

February 2) Website. Retrieved Oct 13, 2015, from http://www.zdnet.com/blog/btl/data-breachcosts-customer-churn-up-a-bit-repeat-offenders-abound/12015

 

Identity Theft and Assumption Deterrence Act. (n.d) Website. Retrieved Oct 13, 2015, from

 

http://www.ftc.gov/os/statutes/itada/itadact.htm

 


 

TFT2: Task 4

 


 

 


Solution details:

Pay using PayPal (No PayPal account Required) or your credit card . All your purchases are securely protected by .
SiteLock

About this Question

STATUS

Answered

QUALITY

Approved

DATE ANSWERED

Oct 15, 2019

EXPERT

Tutor

ANSWER RATING

YES, THIS IS LEGAL

We have top-notch tutors who can do your essay/homework for you at a reasonable cost and then you can simply use that essay as a template to build your own arguments.

You can also use these solutions:

  • As a reference for in-depth understanding of the subject.
  • As a source of ideas / reasoning for your own research (if properly referenced)
  • For editing and paraphrasing (check your institution's definition of plagiarism and recommended paraphrase).
This we believe is a better way of understanding a problem and makes use of the efficiency of time of the student.

NEW ASSIGNMENT HELP?

Order New Solution. Quick Turnaround

Click on the button below in order to Order for a New, Original and High-Quality Essay Solutions. New orders are original solutions and precise to your writing instruction requirements. Place a New Order using the button below.

WE GUARANTEE, THAT YOUR PAPER WILL BE WRITTEN FROM SCRATCH AND WITHIN A DEADLINE.

Order Now