Question: SECTION A (40 MARKS) Read the extract below and answer ALL the questions that follow, Brief Study of Cybercrime on an Internet Rapid technological growth

SECTION A (40 MARKS) Read the extract below and
SECTION A (40 MARKS) Read the extract below and answer ALL the questions that follow, Brief Study of Cybercrime on an Internet Rapid technological growth and developments have provided new opportunity and productive sources for organizations of all sizes. Technological growth is majorly braced by the internet and new technologies have brought threats and cybercrime continues to evolve with new threats. It's an effective idea to know how to recognize cybercrime to help protect yourself from attack and how to protect your data. Hackers are tuming to Internet-based social networking sites for exploitation. Today anyone can send and receive any form of data, be it an e-mail, audio or video by just clicking the button. The Internet is the fastest ' growing infrastructure in everyday life and the latest technologies are changing the face of mankind. But due to these emerging technologies, we are unable to safeguard our private information and hence these days' cybercrimes are increasing day by day. Even }he latest technologies like cloud computing, mobile computing, E-commerce, net banking etc. also need a high level of security asit holds some important information regarding a person whose security has become a must thing. Improving Cybersecurity and protecting information is important to each nation's safety and economic wellbeing Extracted from: hitps://www.researchgate.net/profile/Dhaval- QUESTION 1 (20 Marks) \"Today anyone can send and receive any form of data, be it an e-mail, audio or video by just clicking the button.\" Analyse the security challenges of email and provide suggestions on securing your email. QUESTION 2 (20 Marks) \"It's an effective idea to know how to recognize cybercrime to help protect yourself from attack and how to protect your data.\" Analyse and report on the ways you would recognise cybercrime on the intemet (explanation must include how to identify cybercrime and related actions to adopt). SECTIONB [60 MARKS] Answer ANY THREE (3) questions in this section. QUESTION 3 (20 Marks) Assume you are a systems analyst for a software development company. Provide a detailed report to your software development project leader on the copyright restrictions and limitations regarding the following classifications of software: commercial and public domain (open source) software. Include an explanation of each category of software as well as the impact the limitations will have on the classifications of software. QUESTION 4 (20 Marks) Email is the number one usage of the internet both at home and at work. While a business does not need to concem itself with its employees' personal email, proper precautions should be taken when it comes to email at work. Appraise the importance of having an employee email policy within any business. QUESTION 5 (20 Marks) The Protection of Personal Information (POPI) Act sets out the minimum standards regarding accessing and 'processing' any personal information belonging to another. Critically assess the principles of the POPI ACT in protecting the users of wearable devices and recommend possible ways the POPI ACT can be updated to offer appropriate protection since the volume of the data has left the act failing to cover some privacy aspects of the wearable devices

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Law Questions!