Chapter 4 of the textbook is full of requirements in cryptography and forensics that organizations need to consider. Write a paper as if your export company senior leaders have asked you to explain the legal issues of crypto and forensics – and make recommendations. Describe cryptography laws that pertain, legal considerations, and what crypto method you recommend, including key length. Discuss export laws, some countries with which you can safely do business, and what countries to completely avoid. What about your products that have crypto embedded in them? Will you need an encryption import license? Have you made sure you aren’t infringing on crypto patents? Comment on your ITAR position (feel free to make up what your product lines are). Does the state where you live have any unique crypto laws? How are you prepared to provide best digital evidence if your company gets in a legal fight? Discuss preservation and spoliation of evidence with your policies to stay out of trouble. Do you have expert witnesses on retainer? Does your state require licensed private investigators in forensics cases? Do you have private investigators working for the legal counsel? Are you safeguarding personal information collected by the biometrics tools in your cyber security program? How?There are a lot of prompts here so make sure you are responding to all of them. You don’t need to get extremely deep on each topic. Provide a high-level summary and move on to the next topic. The length of the paper is not specified; you will be graded on how thoroughly you treat each section of the assignment and for the quality of your writing. Your paper must be in APA, 7th edition format and include title and reference pages. Multiple sources are expected and they should be peer-reviewed papers or articles from reputable publications (i.e. no marketing pamphlets, wikileaks). Cite all sources including graphs, charts, and pictorials. For APA and Standard Paper Assignment Guidelines, select the “Course Resources” link in the left navigation area.
Describe cryptography laws that pertain, legal considerations, and what crypto method you recommend, including key length. Discuss