Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
1 Source
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 3.6
Topic:

Computer Forensics: Cybercriminals, Laws and Evidence

Essay Instructions:

required to submit an answer to the practical question on p. 50 from Maras Book.
Book: Maras, M.H. (2014). Computer Forensics: Cybercriminals, Laws and Evidence. New York: Jones and Bartlett, Second Edition.
Guidelines:
1. Use definitions, for example, define hearsay (you can use the book's definition)
2. Give me the blur of the story
3. Your analysis/answer the question
OR
1. the story/case
2. definition/analysis
3. if you are ambitious, you will add also advice at the end (you want to create solutions, not just state the issues)
OR
your own structure - but should be logical
Most importantly:
use references
use word doc
limit sentences to 22 words
I encourage you to post in the Monitoring Lab - What is going on in the CyberWorld? Come on guys, spread awareness. Find something interesting and let people know - by people I mean - US - your community.
Cheers

Essay Sample Content Preview:

Cybercrime – Case Study
Your Name
Your Institution of Affiliation
February 25, 2018
While the concept of Cybercrime has been around for almost a decade, knowing the full breadth of illegal activities that need to be considered and sanctioned has been a trouble for most countries. Nevertheless, the United States Department of Justice has provided the definition of cybercrime as being “any illegal activity for which a computer is used as its primary means of commission, transmission, or storage” (Legal-Dictionary.net, n.d.). While this might seem as ‘lacking’ in terms of definition, it still encompasses the whole idea of it. Back in 2016, one of the biggest cybercrimes has been committed against the popular social network, friendfinder.com, which is being run by FriendFinder Networks Incorporated. During the attack, it was said that 412 user network accounts have been exposed as hackers managed to enter the network’s mainframe and gather all the data (ComputerWeekly.com, 2016). This then created a breach in everyone’s “privacy”, which also undermining their security during the process.
While the story of FriendFinder above shows how cybercrimes could endanger our security during this time when almost anything is ‘on the cloud’, it doesn’t capture the full possibility of risks that these illegal activities could do. Every year, thousands of cybercrime cases are being committed and billions of people are falling into this trap despite the regulations imposed the government itself. Thus, this calls for an innovative change that would mitigate these attacks, which depends on algorithms and other useful technologies rather than arbitrary and “hard-to-enforce” laws that are being forwarded by the government.
In the past decade, this idea of mitigation through algorithms have been realized through the use of block chains. Simply said, block chains are “digitized, decentrali...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!