Question

In: Computer Science

Search online to find an incident of a cybercrime (not included in the readings). Please describe...

Search online to find an incident of a cybercrime (not included in the readings). Please describe the event. What are the lessons learned? How can these lessons be implemented in the United States? Write a 1 to 2 page paper answering these questions.

Solutions

Expert Solution

Cybercrime is a crime originated from computer using internet and network by breaking basic security an individual's/business' computer may have. This crime is handled by organized professionals.

The cybercriminals creates malware which is a small software containing computer viruses to gain partial or complete access of someone’s computer once connected to internet. It not only impacts an individual but also attacks business in a professional manner. Various smart devices like ipad, smart phones are very popular these days. Cybercriminals attack these devices as well. Apart from very common theft using malwares, criminals use many other tricks to lure individual, various businesses. Identify theft is one the major crime in the USA. Below are some commonly used cybercrimes:

  • Phishing: fraudulent emails/messages having links that can steal your personal information.
  • Pharming: uses malware to route to fake websites and providing credentials will expose indivisual to hacker’s world.
  • Keylogging: using key type recoding, a certain type of malwares steal personal information.
  • Sniffing: this happened when someone is connected to unsecured wifi. Cybercrooks can gain access to your device easily by this hacking process.
  • Cyberbullying: this is any type of online harassment when hackers get access to you personal data.

To make sure you are not victim of cyber-crime, some basic precautions need to be taken as below:

  1. Make sure the device has a newly updated antivirus all the time.
  2. Do not open any links which may not relevant to you and looks sketchy. Specially bank, involving personal information as SSN, password etc.
  3. Be careful when downloading anything from internet.
  4. Never use unencrypted, unsecured public wifi
  5. Passwords should be very strong, avoid dictionary word, date of birth and anything that can be guessed from some personal information.
  6. Should not fill up online surveys without knowing if it is legit.
  7. Use common sense, anything free in internet may be a trap.    

Sometimes it is very tough to catch a cybercriminal as they are very organized and might be operating from any part of the globe, sometimes state sponsored.

Ransomware is one of the worst organized cyber-attack happened in recent time. It was targeted towards businesses and made a havoc loss. It is an attack where your sensitive data is encrypted and decryption is provided based on ransom.

The FBI policy restricts paying a ransom in response to a ransomware attack as it has been noticed that even after paying the ransom, hackers never provided decryption keys. Paying a ransom also encourages this crime. FBI has a setup a separate department to handle cyber crimes. In US, every state has different law to handle cyber-crimes. Sentences are based on amount of damage made but sometimes it is very tough to find out the severity. . In general, if the severity is high, it is considered as felony.

One challenge the legal system faces is fast evolving technological advancement and its curse on new users who are not so internet-educated and can be used as victims easily.


Related Solutions

Please search online business press and find a recent article related to “Accrual versus Cash Accounting,”...
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,” “Revenue Recognition,” or “Accounting Fraud.” Then please provide the webpage link of the article together with the answers to the following questions. Question 1: How is your article of choice related to topics above and why you think it is interesting? Question 2: What are the practical implications of this article?
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,”...
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,” “Revenue Recognition,” or “Accounting Fraud.” Then please provide the webpage link of the article together with the answers to the following questions. Answer for each question is limited to 120 words , APA style and is peer review. Question 1: How is your article of choice related to topics above and why you think it is interesting?
search current news to find an article about a company that experienced an accounting fraud incident...
search current news to find an article about a company that experienced an accounting fraud incident in the last three years. Summarize the article and include proper APA citation and reference list as part of your posting. some important focal points: What was the nature of the fraud (occupational or managerial)? Who were the key players? How does the event fit the Fraud Triangle? What was the end result?
locate a recent case of online child pornography. Write a summary of the incident and describe...
locate a recent case of online child pornography. Write a summary of the incident and describe how the incident was discovered, and what criminal outcome occurred to the offender.
Q1. Search online to find an example policy statement and show the five components of a...
Q1. Search online to find an example policy statement and show the five components of a security policy in the statement. Q2. Describe the difference between DAC and MAC policies. Q3. Explain the difference between Black-Box and White-Box testing. Use one specific example for each. Q4. Discuss the advantages and disadvantages of dynamic analysis technique over static analysis techniques. Q5. Explain the two extensions of RBAC model in two separate paragraphs. Discuss the advantage of each one. Q6. What are...
Instructions: Search the news, or online articles and sites to find the term “probability” (likelihood, odds,...
Instructions: Search the news, or online articles and sites to find the term “probability” (likelihood, odds, and expected outcome are also acceptable terms rather than “probability”). Locate two examples, one where you believe it is used correctly and one that you think seems fishy. Post your sources as a reference. No need to explain the articles, or how the term is used because that will be done in our response later in this module.
Search online and find the most recent Big Mac Index and make a list of 10...
Search online and find the most recent Big Mac Index and make a list of 10 countries including US. Which currencies are over valued and which under valued (if any)? Provide a possible explanation of why a selected currency is over valued.
Search online and find 1-3 articles that discuss the competition between Target and Walmart. For each...
Search online and find 1-3 articles that discuss the competition between Target and Walmart. For each article: • Identify Provide a link to the article. • Identify which aspects of the article will be helpful as you conduct your SWOT analysis.
(1) Use a search engine to find two different online data markets. Write a report sharing...
(1) Use a search engine to find two different online data markets. Write a report sharing the sources or focus of information each provides, the availability of visualization tools to preview data, and how developers can access or incorporate the data into their and websites.
Develop an incident response plan for a online retail site. The audience for this plan is...
Develop an incident response plan for a online retail site. The audience for this plan is the Board of Directors within the company. This paper should be 3 to 4 pages in length, double spaced.  All writing must include proper grammar, spelling, punctuation and citations. write in your own words.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT