Issues in computer 2,REQUIRED TEXTBOOK AND MATERIALS: Computer Security Fundamentals. Author: Easttom. Edition: 3rd. ISBN: 9780789757463 ( you can find PDF file on Additional Files) REQUIRED TEXTBOOK AND MATERIALS: Computer Security Fundamentals. Author:

Read Carefully**********

Assignment- 1 Due **Today , 26 Sunday ( 10pm)

Assignment 2 Due On 30th October ( 8 pm)

Assignment 3 ** On 5th November ( 10pm)

Assignment 4 & 5
** Due On 12 November ( 10pm)

REQUIRED TEXTBOOK AND MATERIALS: Computer Security Fundamentals. Author: Easttom. Edition: 3rd. ISBN: 9780789757463 ( you can find PDF file on Additional Files)

REQUIRED TEXTBOOK AND MATERIALS: Computer Security Fundamentals. Author: Easttom. Edition: 3rd. ISBN: 9780789757463

**** Each assignment Mush need be 1 Paragraph 
MUST be require- 
1.Content (3 pts)
2.Using textbook or other material to support your content (2 pts)
3. Clarity (standard English grammar, correct spelling, complete sentences) (3 pts)
4. Response to another’s post (1 pt for each response to another’s post) 
5. APA Citation guideline usage (1 pts)
6. One Source for each assignment

Assignment 1: 
Write a summary describing steps regarding the handling of employees. Include all steps that you believe an organization should take to prevent corporate espionage. It is important that you support your opinions with sources and reasons. ( chapter 7)

Assignment 2 :
Write a brief summary describing any encryption method not already mentioned in this chapter. In this summary, describe the history and origin of the algorithm. Compare the efficacy of this algorithm to other well-known algorithms. (chapter 8)

Assignment 3 :
Read the case study on p. 249. Consider:
1. What other actions might you recommend to Jane?
2. Would you recommend a different firewall? Why or why not?( chapter 9)

Assignment 4 :
Read the case study on p. 275. Consider:
1. Given the highly sensitive nature of the work at this company, what other actions might you add to this policy? (chapter 10)

Assignment 5 :
Write a brief essay discussing the ethics of online investigations. Do you feel these investigations are an invasion of privacy? Why or why not? If you do feel they are an invasion of privacy, what do you think can be done about it? Are there problems with getting inaccurate information? ( chapter 13 )