1.This week students will look at some of the  different cybercrimes, how to develop a security policy and various security and privacy regulations

Identify various cybercrimes

  • Explain various regulations on minimizing cybercrimes

Read textbook chapter 4

Ajayi, E. F. G. (2016). Review Challenges to enforcement of cyber-crimes laws and policy. Journal of Internet and Information Systems, 6(1), 1-12.10.5897/JIIS2015.0089

2. students will examine some of the different types of cryptographic attacks such as those on social media platforms.

  • Identify different Cryptographic Attacks
  • Explain how attacks on social networks work

Read: Textbook: Chapters 7 and 8

Franchi, Enrico & Poggi, Agostino & Tomaiuolo, Michele. (2017). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research, 8. 25-42. 10.4018/JITR.2015010103

Tabari, A. Z., & Ou, X. (2020). A First Step Towards Understanding Real-world Attacks on IoT Devices. There is a link to the PDF of this article in the right column of this record under Download.