澳洲老师在打分过程中,最看重的一部分是Commentary and analysis
所以这次report要求是Terms /principles identified, thoroughly analysed
Overview and Requirements
篇幅限制,analysis report of approximately 2000 words.
In our introductory seminars, we have discussed how important it is for the information security analyst to keep up-to-date with new laws that emerge and possibly impact the analyst.
It is now quite common that technology/software application companies include secure communication features in their products. Frequently these communication features are based upon “end-to-end” encryption. This functionality has directly heightened fears in many law enforcement agencies across many countries that the agencies’ surveillance capabilities are progressively “going dark1”. This in turn has heightened the differences in ideology, legislation and security practices that are viewed as necessary by various major community stakeholders such as law enforcement agencies, the overall information security community, privacy advocates, and the general business community.
In this assignment, you are required to describe and critically analyse the context, the aims/goals/operational approaches, and broad commentary of the Access and Assistance Act. You are required to report your analysis in approximately 2000 words (12-point font). Your report should have the following top-level structure代写:
1. Introduction and context. The case for the Act – why the Australian Government has framed this legislation. In describing this case, it is also necessary to briefly summarize the ‘going dark’ debate (especially in the U.S.). The case for the Act may also include some analysis of the coalition of 5 nations called “Five Countries” or “Five Eyes” – and the role, if any, this coalition plays in the formulation of the Act.
2. Aims and operational approaches of the Act. Please note that this does not mean a detailed legal analysis of the Act. You need to describe in business English (not legal terminology) what the Act requires of the business sector.
3. A discussion of the major concerns about the Act. For example, there has been great debate as to the possibilities of the Act causing the introduction of ‘systemic’ weaknesses into vital business/community software systems. The Government has said that this cannot be done under the Act – however the critics on this point remain very vocal. Why is this the case?