Computer Forensics: Cybercriminals, Laws and Evidence
required to submit an answer to the practical question on p. 50 from Maras Book.
Book: Maras, M.H. (2014). Computer Forensics: Cybercriminals, Laws and Evidence. New York: Jones and Bartlett, Second Edition.
Guidelines:
1. Use definitions, for example, define hearsay (you can use the book's definition)
2. Give me the blur of the story
3. Your analysis/answer the question
OR
1. the story/case
2. definition/analysis
3. if you are ambitious, you will add also advice at the end (you want to create solutions, not just state the issues)
OR
your own structure - but should be logical
Most importantly:
use references
use word doc
limit sentences to 22 words
I encourage you to post in the Monitoring Lab - What is going on in the CyberWorld? Come on guys, spread awareness. Find something interesting and let people know - by people I mean - US - your community.
Cheers
Cybercrime – Case Study
Your Name
Your Institution of Affiliation
February 25, 2018
While the concept of Cybercrime has been around for almost a decade, knowing the full breadth of illegal activities that need to be considered and sanctioned has been a trouble for most countries. Nevertheless, the United States Department of Justice has provided the definition of cybercrime as being “any illegal activity for which a computer is used as its primary means of commission, transmission, or storage” (Legal-Dictionary.net, n.d.). While this might seem as ‘lacking’ in terms of definition, it still encompasses the whole idea of it. Back in 2016, one of the biggest cybercrimes has been committed against the popular social network, friendfinder.com, which is being run by FriendFinder Networks Incorporated. During the attack, it was said that 412 user network accounts have been exposed as hackers managed to enter the network’s mainframe and gather all the data (ComputerWeekly.com, 2016). This then created a breach in everyone’s “privacy”, which also undermining their security during the process.
While the story of FriendFinder above shows how cybercrimes could endanger our security during this time when almost anything is ‘on the cloud’, it doesn’t capture the full possibility of risks that these illegal activities could do. Every year, thousands of cybercrime cases are being committed and billions of people are falling into this trap despite the regulations imposed the government itself. Thus, this calls for an innovative change that would mitigate these attacks, which depends on algorithms and other useful technologies rather than arbitrary and “hard-to-enforce” laws that are being forwarded by the government.
In the past decade, this idea of mitigation through algorithms have been realized through the use of block chains. Simply said, block chains are “digitized, decentrali...
👀 Other Visitors are Viewing These APA Essay Samples:
-
The Impact of Online Class on University Students
2 pages/≈1100 words | No Sources | APA | Literature & Language | Essay |
-
Caring and Holism in Nursing Practice and Clinical Decision-Making and Safety in Practice
2 pages/≈550 words | No Sources | APA | Literature & Language | Essay |
-
What do you Mean I Wrote a C Paper? Writing, Revision, and Self-Regulation
2 pages/≈550 words | No Sources | APA | Literature & Language | Essay |