Computer Forensics: Cybercriminals, Laws and Evidence (Essay Sample)
required to submit an answer to the practical question on p. 50 from Maras Book.
Book: Maras, M.H. (2014). Computer Forensics: Cybercriminals, Laws and Evidence. New York: Jones and Bartlett, Second Edition.
1. Use definitions, for example, define hearsay (you can use the book's definition)
2. Give me the blur of the story
3. Your analysis/answer the question
1. the story/case
3. if you are ambitious, you will add also advice at the end (you want to create solutions, not just state the issues)
your own structure - but should be logical
use word doc
limit sentences to 22 words
I encourage you to post in the Monitoring Lab - What is going on in the CyberWorld? Come on guys, spread awareness. Find something interesting and let people know - by people I mean - US - your community.
Cybercrime – Case Study
Your Institution of Affiliation
February 25, 2018
While the concept of Cybercrime has been around for almost a decade, knowing the full breadth of illegal activities that need to be considered and sanctioned has been a trouble for most countries. Nevertheless, the United States Department of Justice has provided the definition of cybercrime as being “any illegal activity for which a computer is used as its primary means of commission, transmission, or storage” (Legal-Dictionary.net, n.d.). While this might seem as ‘lacking’ in terms of definition, it still encompasses the whole idea of it. Back in 2016, one of the biggest cybercrimes has been committed against the popular social network, friendfinder.com, which is being run by FriendFinder Networks Incorporated. During the attack, it was said that 412 user network accounts have been exposed as hackers managed to enter the network’s mainframe and gather all the data (ComputerWeekly.com, 2016). This then created a breach in everyone’s “privacy”, which also undermining their security during the process.
While the story of FriendFinder above shows how cybercrimes could endanger our security during this time when almost anything is ‘on the cloud’, it doesn’t capture the full possibility of risks that these illegal activities could do. Every year, thousands of cybercrime cases are being committed and billions of people are falling into this trap despite the regulations imposed the government itself. Thus, this calls for an innovative change that would mitigate these attacks, which depends on algorithms and other useful technologies rather than arbitrary and “hard-to-enforce” laws that are being forwarded by the government.
In the past decade, this idea of mitigation through algorithms have been realized through the use of block chains. Simply said, block chains are “digitized, decentrali...
You Might Also Like Other Topics Related to illegal immigration:
- Legalization Of Marijuana Many Decades Up To The Present TimesDescription: Controversy on the topic of legalization of Marijuana has existed for many decades up to the present times. The use of Marijuana is largely associated with negative side as opposed to minimal health benefits attached to this drug....3 pages/≈825 words | 3 Sources | MLA | Literature & Language | Essay |
- Attribution Theory: Causes And Patterns Of Crime Description: Assess attribution theory within the organization and describe how you have applied attribution theory in the workplace. Please provide 1-2 examples to support your viewpoints....1 page/≈275 words | 2 Sources | APA | Business & Marketing | Essay |
- Illegal Organ Transplants: The Major Sources Of OrgansDescription: In the sections that follow, the paper examines the major sources of organs, the relationship between tourism and illegal organ transplants, and the potential solutions to the problem....2 pages/≈550 words | 6 Sources | APA | Health, Medicine, Nursing | Other (Not Listed) |