please read instructions , 6 separate submissions
draft 5-7 page
Oral Statement
Oral Statement
to Congress
Now that you have developed your solutions, you are ready to create a draft of your
oral statement
. To get started, complete the following:
1. Review best practices for preparing an oral statement to a Congressional committee or other policy-making body or public forum.
2. Create a five- to seven-page written draft of your statement.
3. Reference the CFAA and at least one state statute.
4. Reference new developments in cybersecurity governance and legislative and regulatory processes.
Submit your draft to your instructor for feedback.
Oral Statement
Oral statements are used to convey expertise, perspective, knowledge, and/or experience on a given topic. They are a mechanism to deliver information before one or more people, usually with the expectations that questions will be asked and answered during the session. Oral statements are generally accompanied by a written component that should largely represent the oral report that you will give. While your oral testimony might not be recorded, your written statement will be preserved as a record of your time before a given body.
Generally, you will not be able to cover all of your points in an oral statement due to time restrictions, so it is important to capture your key points in a written statement. Doing so will allow you to identify and prioritize the points you want to emphasize during the oral component of your testimony. Your testimony should be concise, clear, and direct. You should avoid acronyms, stick with your perspectives and knowledge, and try to anticipate and answer questions in your written component.
Your statement should start by thanking the inviting party and by introducing yourself, sharing the background and experience that qualifies you to speak on the given topic. An initial executive summary of a few paragraphs is preferred as it provides a succinct introduction to your topic. You should use an outline to complete your written draft, being certain to address the requested topics or questions. Your written statement should be carefully proofread and corrected, and you should cite sources in the appropriate format as footnotes or endnotes.
Project Scenario
As the chief information security officer known as the CISO [pronounced siss-so] for a trade association, part of your job is to monitor potential legislation that could affect your industry. You’ve been following attempts by legislators to amend the federal Computer Fraud and Abuse Act (CFAA), which made the news some years ago when Internet activist Aaron Swartz committed suicide before he went to trial on federal data-theft charges under the act.
Swartz, who believed in open access to information, was indicted for downloading millions of documents from a subscription-based academic database. Although Swartz was authorized to read papers on the site, federal prosecutors alleged that Swartz hacked restricted data from the Massachusetts Institute of Technology’s network. He was indicted for counts of wire fraud, computer fraud, unlawfully obtaining information from a protected computer, and recklessly damaging a protected computer, all with a maximum penalty of 35 years in prison and 1 million dollars in fines.
This week, the CEO of your organization sends you a memo explaining that he has been asked to make a statement before a Congressional committee. In the aftermath of the Swartz case, lawmakers have proposed amending the CFAA. The memo states, “I need you to provide me arguments for amending the CFAA, as well as specifics on where and how the law should be amended. Should some criminal sanctions be preserved? If so, which kind of actions would be appropriate? Provide examples of how your proposed changes would affect potential problems in the workplace.”
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
· 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
· 2.2: Locate and access sufficient information to investigate the issue or problem.
· 7.4: Align an organization’s security posture to applicable laws, statutes, and regulatory documents.
When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.
· 1.8: Create clear oral messages.
Project 2
Cyber Crime Awareness Summary 1-2 page
Computer Fraud and Abuse Act Analysis CFAA 1-2 page
Computer Crime Comparison Table
– Table
Oral Statement draft 5-7 page
Written Statement (revised oral Statement) 5-7 page
Oral Statement
Cyber Crime Awareness Summary
Using the notes you took on the Cybercrime Awareness module in the last step, write a one- to two-page summary. You may use your own insights; however, each of the following items must be briefly discussed:
1. What is the relationship between between criminal and civil court systems as they apply to cybersecurity policy?
2. What is compliance?
3. What can US organizations do to comply with regulatory issues?
4. What policies and technologies can be used to address regulations?
5. How can US organizations monitor compliance with cybersecurity policies and relevant regulatory requirements?
6. List the laws and regulations mentioned in the module.
7. List information security strategies, plans, policies, and procedures mentioned in the module that can be used to reduce regulatory risk.
CFAA
After completing your research on the Computer Fraud and Abuse Act, write a one- to two-page analysis of the statute and its effectiveness. This analysis will be Exhibit A for the final assignment.
Include in your analysis:
1. a background of the CFAA
2. examples of how the CFAA might positively address the general misuse of computer systems and reduce computer crime
3. examples of abuses and overreaching by government in applying the law
4. discussion of how effective the CFAA is in protecting organizations from cyberattacks
Computer Crime Comparison Table
Now that you have identified CFAA clones from at least three states, you will compare and contrast them with one another and the CFAA. Be sure to include specific vulnerabilities that the statutes are intended to address regarding computer access. Document your conclusions in the first section of the Computer Crime Comparison Table titled “Statute Comparisons.” This table will aid you in developing your solutions.
So far in this project, you have familiarized yourself with cybercrime and laws that were written to protect against cybercrime. In this step, you will determine how effective you believe these statutes to be. Identify at least one actual use case for each state as well as for the CFAA to acquaint yourself with how well state/CFAA laws have been implemented. Continue to complete the
Computer Crime Comparison Table that you began in Step 6. Document your conclusions in Section 2, Actual Cases.
Oral Statement
Now that you have developed your solutions, you are ready to create a draft of your oral statement. To get started, complete the following:
1. Review best practices for preparing an oral statement to a Congressional committee or other policy-making body or public forum.
2. Create a five- to seven-page written draft of your statement.
3. Reference the CFAA and at least one state statute.
4. Reference new developments in cybersecurity governance and legislative and regulatory processes.
Written Statement
Now that you have a draft of your written statement, it is time to finalize it in order to prepare for your oral statement. Be sure to incorporate any feedback your instructor provided into the final version.
Your goal in delivering this statement is to educate Congress on the implications this legislation will have on your industry. It is important that your statement is clear, concise, and demonstrates your knowledge of the issues. For more tips on how to deliver an oral statement to a congressional committee, consult
Delivering an Oral Statement
for guidance.
Submit your five- to seven-page written statement with the following attached as appendices: Cybercrime Awareness Summary, Computer Fraud and Abuse Act Analysis, and Computer Crime Comparison Table. The appendices do not contribute to the length of the written statement.
Oral Statement Submit
Computer fraud and Abuse Act Analysis 2
The Computer Fraud and Abuse Act (CFAA) delineate specific illegal acts relating to computer crimes. The CFAA covers the following:
· Defines specific key terms used throughout the legislation.
· Outlines the components that do and do not constitute criminal acts.
· Specifies the consequences of those acts, as well as certain aggravating factors.
· Describes exceptions to the criminality of these acts in cases of law enforcement and similar contexts.
The essential stipulations said inside the content of the CFAA sanctioned administrative and managerial measures as to the assurance of legitimate contemplations and possibility of between PC get to.
Programmers are often characterized as people undertaking unlawful, unapproved section into work stations, databases, or virtual systems having a place with another with aim to perpetrate a wrong doing or cause devastation.
The principles and practice that are cited inside the computer fraud and abuse act are large number of statues communicated by CFAA, maybe the most unmistakable is the arrangement of access to which was given order of either ‘approved’ or ‘unapproved’. Inside the domain approval, the individual recognizable proof of the idea of that approval is thought to be the essential impetus for the assurance of any or all infringement of the computer fraud and abuse act. Unapproved access to administrative PCs is considered to incorporate endeavors to establish the accompanying criminal movement.
CFAA can positively address the general the misuse of computer by hot backing up cyber bullying logic bombing cybersquatting cyber terrorism; this can prevent attacks such as Denial-of-service. Though the law is meant to protect classified information, financial data, but it faces the challenges of using the criminal law to prohibit private parties from perpetrating illegal activities.
The government has utilized this medium to exploited individual by forcefully access their privacy against their knowledge. An example is FBI v Apple Inc when the bureau sited the law to have access to a suspects device which the company clear feared siting privacy issues.
The CFAA can be more effective if it is actively implemented, by creating a preemptive measure that would create a sustainable development in its structure.
Computer Crime Comparison Table
Statute Comparison
State Statute |
Attributes Compared to CFAA |
Attributes Contrasted to CFAA |
Report on Effectiveness in Its State |
Actual Use Case
Name of Case |
Statute Reference |
Judicial Opinion |
Statute Success |
Delivering an Oral Statement
You will need to deliver an oral statement that is clear, confident, and exhibits knowledge of the issue. Usually, written statements must be available to the committee 24-48 hours in advance. In the interest of time, it is usually not necessary or desirable for a witness to read his or her entire written statement.
Some general guidelines for preparing a statement to Congress include the following:
· Introduce yourself, your occupation, organization, and personal relevant background of the subject.
· Greet the chairman of the committee and the committee as a whole.
· Be brief, you will have about five minutes to speak.
· State the issue you will testify on.
· Focus only on key points.
· Focus on the current situation and how the action you recommend will improve it.
· Avoid presentation software (such as PowerPoint).
· Check with committee staff in advance about the use of visual aides.
·
At the end, briefly wait for questions from committee members.
References
Davis, C. M. (2015). House committee hearings: Witness testimony. Congressional Research Service. Retrieved from
https://www.fas.org/sgp/crs/misc/98-338
How to Write and Present Testimony. (n.d.). Retrieved from
http://www.cbf.org/Document.Doc?id=302
Spafford, E. H. (n.d.). Advice on government testimony. Retrieved November 18, 2016, from http://spaf.cerias.purdue.edu/usgov/testimony.html
Tomasa, T. (n.d.). Chapter 4: Drafting Written Testimony and Presenting Oral Testimony. In M. K. N. Haia, M. C. Jarman, E. A. H. Martin, J. E. Mccarty (Eds.), E alu like mai i ka pono: Coming together for justice (pp. 25-30). Retrieved from
http://www.hawaii.edu/ohelo/resources/AluLikeWorkbook/Chap4
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.