Analysis of United States v. Meydbray Case: IT Security Breach

Verified

Added on  2022/09/09

|11
|520
|15
Presentation
AI Summary
This assignment presents a case analysis of United States v. Meydbray, focusing on the actions of a former IT manager who was charged with computer crimes. The analysis details the specific policy violations, including breaches of confidentiality, email use, password management, internet use, and change control policies. The case involves unauthorized access to the company's computer system, reading emails, and causing intentional damage. The assignment also highlights the accountability of both the individual and the IT staff, emphasizing the importance of secure network access. The synopsis provides context, mentioning the increasing number of security breaches and the need for robust network design. The document references the indictment and provides a brief overview of the case, referencing the indictment from the Department of Justice Northern District of California. The analysis underscores the significance of IT security in today's environment and emphasizes the need for comprehensive security policies and protocols to prevent such incidents.
Document Page
CASE ANALYSIS
Name of Student
Name of University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VIOLATED POLICIES
Confidentiality Policy-
This policy provides with
the guidelines for the use
of the information of the
company.
This policy was breached
by Mr. Roman Meydbray
when he read emails of
the president of the
company after he had
been terminated.
He was further charged
twice for unlawful access
to the stored
Document Page
VIOLATED POLICIES
Email use policy
In this policy the behaviour
related to using emails and
the email systems have been
provided
This policy was breached by
Mr. Meydbray.
This policy was breached by
him when he changed the
passwords of the email
accounts and read the
emails of the company’s
president in an unauth0rized
manner after getting
Document Page
Violated
Policies
Password Management Policy
This policy provides with the rules
in relation to the creation,
management and changing of
passwords in the user-levels and
system-level
Mr Meydbray had breached this
policy
He was in breach of this policy
when he gained unauthorized
access to the computer system of
the company and changed
passwords of the email accounts
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
VIOLATED
POLICIES
Internet Use Policy
This policy provides with the use
of internet and access to the
internet
This policy was also breached by
Mr. Meydbray
He was in breach of this policy
when he gained unauthorized
access to the company’s computer
system
Document Page
VIOLATED POLICIES
Change Control Policy
This policy provides the rules for
implementing potential changes
that can be considered as
significant to the information
system
This policy was also breached by
Mr. Meydbray
Mr. Meydbray breached this
policy when he made intentional
and reckless damages to the
computer systems 0f the
company by gaining
unauthorized access to the
Document Page
ACCOUNTABILITY
Apart from Mr Roman
Meydbray the IT staffs
would be held accountable
for these policy breaches
as they are accountable
for ensuring that the
system is protected from
any kind of malfunctioning
and breach.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SYNOPSIS
In the recent years
there have been a
huge development in
the fast and secure
network access.
However, there have
been a lot of high
profile cases for the
breach of security by
the hackers. The case
United States v
Meydbray is one of
Document Page
SYNOPSIS
In the case the former Information
Technology Manager of a Silicon
Valley software firm, c, Inc., had
been charged for getting access to
the company’s computer in an
unauthorized way and damaged the
systm intentionally.
There are thousands of similar cases
of crimes in relation to the computer
systems. These cases are
investigated by the authorities every
year (Tipton & Nozaki, 2007).
Because of these reasons there
have been an increase in the
interest for the designing thee
networks which would not only be
Document Page
REFERENCE
Tipton, H. F., & Nozaki,
M. K. (2007).
Information security
management handbook.
CRC press.
United States v
Meydbray (2005)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Thank you
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]