Cyber Legislative

OverviewYou have been called back by the CISO to report your findings and pursue the next steps of yourinvestigation. During your investigation it was discovered that the estranged husband of the CEO’sexecutive staff assistant had compromised her system’s account, which allowed him to accessconfidential documents including other employees’ personally identifiable information. You havecompleted your forensics investigation and documented the findings in an incident report, andcontinue to maintain and secure evidence in the pursuit of criminal and civil charges. With the information ascertained during your investigation, and utilizing knowledge of networkarchitectures and standards relevant to network investigations, write a 3–5 page paper respondingto the points listed below. You may utilize the resources from your study this week to analyzeappropriate U.S. Supreme Court cases, federal laws, and federal statutes.1. Analyze at least three of the significant U.S. Supreme Court cases focusing on digital crime andevidence. To support your work, reference the federal laws that were violated and the basis forthe case (that is, summarize the case).2. Analyze at least three federal statutes governing electronic surveillance in a communicationsnetwork that can be applied to this case. To support your work, refer to the statutes listed in theElectronic Communications Privacy Act (ECPA).3. Summarize the roles and responses of federal law enforcement agencies and any interagencypartnerships concerning cybercrimes.4. Describe at least three factors that have limited the efforts of local law enforcement to identify andinvestigate cybercrime.5. Provide three sources to support your writing in addition to the textbook. Choose sources that arecredible, relevant, and valid. Cite each source listed on your source page at least one timewithin your assignment. For help with research, writing, and citation, access the library or reviewlibrary guides.This course requires the use of Strayer Writing Standards. For assistance and information, pleaserefer to the Strayer Writing Standards link in the left-hand menu of your course. Check with yourprofessor for any additional instructions.The specific course outcome associated with this assignment is:Evaluate the effectiveness of applications of cybersecurity in preventing crime and abuse