Description

at least one reference and reference citation to a current event less than 4 years old (a reference with no date (n.d.) is not acceptable) in answer to at least one question.

  • Strong arguments can be given as to why encryption tools are needed to safeguard communications in cyberspace, yet these tools can be used by terrorists and criminals to protect their communications in cyberspace. (a) In the wake of September 11, can a case be made for not allowing ordinary users to employ strong encryption tools in Internet communications? (b) Can we still claim to live in a free society if plans for government interception of email communications, as provided for in the Homeland Security Act (http://fl1.findlaw.com/news.findlaw.com/hdocs/docs/terrorism/hsa2002.pdf), are be implemented?Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses. (comprehension


  • Is the expression “ethical hacker” an oxymoron?(a) Do you agree that some individuals should be allowed to be “certified” as hackers to work on behalf of industry or for the interest of other organizations?(b) Do the kinds of activities permitted by certified hackers in the CEH program raise any moral issues?Explain. Please elaborate (beyond a yes or no answer) and provide your “theoretical” rationale in support of your responses.