The purpose of this assignment is to allow students to study some of the world’s most notorious cyber criminals. Students will examine the crimes committed and determine what vulnerabilities could have potentially led to the various crimes.
Review the Federal Bureau of Investigation’s Cyber’s Most Wanted website. Select one suspect and explain the related security laws, crimes committed, security vulnerabilities that were exploited, and how to prevent these incidents from happening again.
Specifically, the following critical elements must be addressed:
- Explain the related security laws based upon the chosen suspect.
- Describe the crimes committed by the chosen suspect.
- Identify the security vulnerabilities that were exploited.
- Propose incident precautions in order to prevent the incident from repeating.
What to Submit
Your paper must be submitted as a two-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins.