Information Security_Ch03
Information Security_Ch03
Email: [email protected]
Mobile Phone: 0915651748
Principles of Information Security
Sixth Edition
Chapter 3
Legal, Ethical,
and Professional
Issues in
Information
Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Learning Objectives
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
• Laws
– Rules that mandate or prohibit certain
behavior and are enforced by the state.
– Law is mandatory and enforceable by legal
authorities.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Law and Ethics in Information Security
• Ethics
– Regulate and define socially acceptable
behavior.
– Adherence to ethical principles in information
security is voluntary, and there is no legal
enforcement of ethical standards.
– Violations of ethical principles may lead to
reputational damage, loss of trust, and
professional consequences
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Law and Ethics in Information Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Law and Ethics in Information Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Organizational Liability and the Need for
Counsel
• Due care
– The legal standard requiring a prudent
organization to act legally and ethically and
know the consequences of actions
• Due diligence
– The legal standard requiring a prudent
organization to maintain the standard of due
care and ensure actions are effective
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Organizational Liability and the Need for
Counsel
• Jurisdiction
– Court’s right to hear a case if the wrong was
committed in its territory or involved its
citizenry
• Long-arm jurisdiction
– Application of laws to those residing outside a
court’s normal jurisdiction; usually granted
when a person acts illegally within the
jurisdiction and leaves
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Policy Versus Law
• Policy
– Information security policies are internal
guidelines and directives established by
organizations to define acceptable behaviors,
practices, and procedures for protecting
information.
– Policies are created by the organization itself
and are enforced through internal mechanisms
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Policy Versus Law
• Policy
– Information security policies are specific to
individual organizations and can vary in scope
and applicability.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Policy Versus Law
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Types of Law
• Constitutional Law
– Originates with the U.S. Constitution, a state
constitution, or local constitution, bylaws, or
charter.
• Statutory Law
– Originates from a legislative branch specifically
tasked with the creation and publication of laws
and statutes.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Types of Law
• Statutory Law
Civil law
Embodies a wide variety of laws pertaining to
relationships between and among individuals and
organizations.
Includes contract law, employment law, family law,
and tort law.
o Tort law is the subset of civil law that allows individuals to
seek redress in the event of personal, physical, or financial
injury. Perceived damages within civil law are pursued in
civil court and are not prosecuted by the state.
Types of Law
• Statutory Law
Civil law
Private law is considered a subset of civil law, and
regulates the relationships among individuals as well
as relationships between individuals and
organizations; it encompasses family law,
commercial law, and labor law.
Types of Law
• Statutory Law
Criminal law
Addresses violations harmful to society and is
actively enforced and prosecuted by the state.
Addresses statutes associated with traffic law, public
order, property damage, and personal damage,
where the state takes on the responsibility of
seeking retribution on behalf of the plaintiff, or
injured party.
Types of Law
• Private law
A subset of civil law
Regulates the relationships among individuals
as well as relationships between individuals and
organizations;
It encompasses family law, commercial law, and
labor law.
Types of Law
• Public law
Regulates the structure and administration of
government agencies and their relationships
with citizens, employees, and other
governments.
Includes criminal law, administrative law, and
constitutional law.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Relevant U.S. Laws
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
General Computer Crime Laws
• Computer Fraud and Abuse Act of 1986
(CFA Act)
Cornerstone of many computer-related federal
laws and enforcement efforts
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
General Computer Crime Laws
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Privacy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Privacy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Privacy
• U.S. Regulations
– Privacy of Customer Information Section of the
common carrier regulation
– Federal Privacy Act of 1974
– Electronic Communications Privacy Act of 1986
– Health Insurance Portability and Accountability
Act of 1996 (HIPAA), aka Kennedy-Kassebaum
Act
– Financial Services Modernization Act or
Gramm-Leach- Bliley Act of 1999
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Identity Theft
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Identity Theft
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Identity Theft
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Identity Theft (2 of 2)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 3-3 U.S. Department of
Justice report on victims of identity
theft in 2012 and 2014
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Export and Espionage Laws
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
U.S. Copyright Law
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Freedom of Information Act of 1966 (FOIA)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Freedom of Information Act of 1966 (FOIA)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 3-5 U.S. government
FOIA requests and
processing
Source: www.foia.gov.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Payment Card Industry Data Security
Standards (PCI DSS)
• PCI Security Standards Council offers a
standard of performance to which
organizations processing payment cards
must comply
• Designed to enhance security of customer’s
account data
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Payment Card Industry Data Security
Standards (PCI DSS)
• Addresses six areas:
– Build and maintain secure networks/systems
– Protect cardholder data
– Maintain a vulnerability management program
– Implement strong access control measures
– Regularly monitor and test networks
– Maintain information security policy
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
State and Local Regulations
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
International Laws and Legal Bodies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
U.K. Computer Security Laws
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Council of Europe Convention on
Cybercrime
• Created international task force to oversee
Internet security functions for standardized
international technology laws
• Attempts to improve effectiveness of
international investigations into breaches
of technology law
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Council of Europe Convention on
Cybercrime
• Well received by intellectual property rights
advocates due to emphasis on copyright
infringement prosecution
• Lacks realistic provisions for enforcement
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
WTO and the Agreement on Trade-Related
Aspects of Intellectual Property Rights
• Created by the World Trade Organization
(WTO)
• The first significant international effort to
protect intellectual property rights;
• outlines requirements for governmental
oversight and legislation providing minimum
levels of protection for intellectual property.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
WTO and the Agreement on Trade-Related
Aspects of Intellectual Property Rights
• Agreement covers five issues:
– Application of basic principles of trading system
and international intellectual property
agreements
– Giving adequate protection to intellectual
property rights
– Enforcement of those rights by countries within
their borders
– Settling intellectual property disputes between
WTO members
– Transitional arrangements while new
system is being introduced
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Digital Millennium Copyright Act (DMCA)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Digital Millennium Copyright Act (DMCA)
• Prohibits
– Circumvention of protections and
countermeasures
– Manufacture and trafficking of devices
used to circumvent such protections
– Altering information attached or imbedded
in copyrighted material
• Excludes Internet Service Providers (ISPs)
from some copyright infringement
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Ethics and Information Security
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Offline
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Offline
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Ethical Differences Across Cultures
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Table 3.2 Rates and Commercial Values
of Unlicensed PC Software Installations
Biennially from 2009 to 2015
Worldwide by Region
Commerc Commerc Commerc Commerc
Rates of
ial Value ial Value ial Value ial Value
Rates of Rates of Rates of Unlicense
of of of of
Unlicensed Unlicensed Unlicensed d
Unlicense Unlicense Unlicense Unlicense
Software Software Software Software
d d d d
Installation Installation Installation Installatio
Software Software Software Software
s in 2015 s in 2013 s in 2011 ns in
($M) ($M) ($M) ($M)
2009
in 2015 in 2013 in 2011 in 2009
Asia Pacific 61% 62% 60% 59% $19,064 $21,041 $20,998 $16,544
Central & 58% 61% 62% 64% $3,136 $5,318 $6,133 $4,673
Eastern
Europe
Latin America 55% 59% 61% 63% $5,787 $8,422 $7,459 $6,210
Middle East & 57% 59% 58% 59% $3,696 $4,309 $4,159 $2,887
Africa
North 17% 19% 19% 21% $10,016 $10,853 $10,958 $9,379
America
Western 28% 29% 32% 34% $10,543 $12,766 $13,749 $11,750
Europe
Total 39% 43% 42% 43% $52,242 $62,709 $63,456 $51,443
Worldwide
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Ethics and Education
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Deterring Unethical and Illegal Behavior
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 3-6 Deterrents to illegal
or unethical behavior
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Codes of Ethics of Professional
Organizations
• Responsibility of security professionals is to
act ethically and according to the policies of
the employer, the professional organization,
and the laws of society.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Table 3-3 Professional Organizations of
Interest to Information Security
Professionals (1 of 2)
Professional Web Resource
Description Focus
Organization Location
Association of www.acm.org Code of 24 imperatives of Ethics of security
Computing personal and ethical professionals
Machinery responsibilities for security
professionals
information www.isaca.org Focus on auditing, information Tasks and
Systems Audit security, business process knowledge required
and Control analysis, of the
Association and IS information systems
planning through the OSA and audit professional
OSM certifications
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Table 3-3 Professional Organizations of
Interest to Information Security
Professionals (2 of 2)
Professional Web Resource
Description Focus
Organization Location
International www.isc2.org International consortium Requires certificants
Information Systems dedicated to improving the to follow its published
Security Certification quality of security code of ethics
Consortium (ISQ2 professionals through SSCP
and CISSP certifications
SANS Institute's www.giac.org GIAC certifications focus on Requires certificants
Global Information four security areas: security to follow its published
Assurance administration, security code of ethic
Certification management IT audits, and
software security, these
areas have standard, gold,
and expert levels
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Major IT and InfoSec Professional
Organizations (1 of 5)
• Association of Computing Machinery (ACM)
– Established in 1947 as “the world’s first
educational and scientific computing society.”
– Code of ethics contains references to protecting
information confidentiality, causing no harm,
protecting others’ privacy, and respecting others’
intellectual property and copyrights.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Major IT and InfoSec Professional
Organizations (2 of 5)
• International Information Systems Security
Certification Consortium, Inc. (ISC)2
– Nonprofit organization focusing on the
development and implementation of information
security certifications and credentials.
– Code is primarily designed for the information
security professionals who have certification
from (ISC)2.
– Code of ethics focuses on four mandatory
canons.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Major IT and InfoSec Professional
Organizations (3 of 5)
• SANS (originally System Administration,
Networking, and Security Institute)
– Professional organization with a large
membership dedicated to the protection of
information and systems.
– SANS offers a set of certifications called
Global Information Assurance
Certification (GIAC).
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Major IT and InfoSec Professional
Organizations (4 of 5)
• ISACA (originally Information Systems Audit
and Control Association)
– Professional association with focus on auditing,
control, and security
– Concentrates on providing IT control
practices and standards
– ISACA has a code of ethics for its
professionals
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Major IT and InfoSec Professional
Organizations (5 of 5)
• Information Systems Security Association
(ISSA)
– Nonprofit society of InfoSec professionals
– Primary mission to bring together qualified IS
practitioners for information exchange and
educational development
– Promotes code of ethics similar to (ISC)2,
ISACA, and ACM
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Contents
• Introduction
• Law and Ethics in Information Security
• Relevant U.S. Laws
• International Laws and Legal Bodies
• Ethics and Information Security
• Codes of Ethics of Professional
Organizations
• Key U.S. Federal Agencies
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Key U.S. Federal Agencies (1 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Key U.S. Federal Agencies (2 of 3)
• Federal Bureau of Investigation
– Primary law enforcement agency; investigates
traditional crimes and cybercrimes
– Key priorities include computer/network
intrusions, identity theft, and fraud
– Federal Bureau of Investigation’s National
InfraGard Program
Maintains an intrusion alert network
Maintains a secure Web site for communication
about suspicious activity or intrusions
Sponsors local chapter activities
Operates a help desk for questions
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Key U.S. Federal Agencies (3 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 3-9 U.S. Secret Service
Operation Firewall
Source: USSS.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Figure 3-11 FBI Cyber’s Most Wanted list
Source: fbi.gov.
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Summary (1 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Summary (2 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Summary (3 of 3)
Copyright © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as
permitted in a license distributed with a certain product or service or otherwise on a password-protected
website for classroom use.
Questions