Question

In: Computer Science

Using the Web, find a case of cyber stalking that is not mentioned in this chapter....

Using the Web, find a case of cyber stalking that is not mentioned in this chapter. You may find some of the following websites helpful:
www.safetyed.org/help/stalking/

Write a brief paper discussing this case, with particular attention to steps you think might have helped avoid or ameliorate the situation.

Solutions

Expert Solution

An employee of a private firm recieved a series of emails asking her to pose for nude pictures or pay a huge amount of money to him.In a complaint to the police,the women said she started receving the mails in first week of October.

The accused threatened the victim by saying that he would put her morphed images on internet with her phone number and address.He also threatened to post her pictues within the neighbourhood premises.She also started receiving emails with her picture which was originally stored in her email,thus knowing that her email got hacked.

The case has been reported to the police and on further investigation the police found that the accused was using the internet from one of the internet cafes and aslo concluded that the accused may be someone who knows the victim close.

To prevent or avoid the situation she should have done the following:

1.Keeping a low profile.

She should have kept her profile private or accessible only to her known friends,this avoids the situation of meeting with a stranger online.

2.Software Updations.

If she had done her software updations regurlary,the chance to hack her accounts may have been decreased.

3.Never disclose sensitive information to strangers.

If she hadn't texted him and completely ignored him,this might to have happened.

4.Keep a good Digital Hygiene

Keeping a good digital hygiene means that you should manage your privacy settings more efficiently.,for example, clear all auto login informations etc from the browsers.


Related Solutions

Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark...
Principles, Cyber security: The Deep Web and The Dark Web - A description of a dark net, the Surface Web, the Deep Web and the Dark Web. Are any of these terms synonymous? Do they all exist? What is the purpose of those that truly exist? need reference or citation for these questions
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion...
Using the Web or other resources, research an example of Cyber Terrorism. Write a brief Discussion describing the terrorism attack and it's aftermath. Comment on ways the attack could have been prevented. Post between 300 and 400 words.
Using the Yahoo! properties mentioned in Chapter 11- 11.2 section, evaluate a particular brand by using...
Using the Yahoo! properties mentioned in Chapter 11- 11.2 section, evaluate a particular brand by using relevant keywords to see what comes up in a search. What did you find? Give examples. Are you surprised by what you saw?
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial...
Cyber security Cryptography Homework Part 1: Find good encryption solutions Search the web for various commercial encryption algorithms. Find one that you feel may be “snake oil”. Write a report explaining the encryption algorithm and your opinion *in-text citations and references are required *written in at least 2~3 paragraphs
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your...
Cyber Security. Dark Web.................................. What is the supposed origin of the Dark Web? What does your team think about whether it is needed/not needed? Important/not important? A security risk/not a risk? Any security implications? Please, need reference or citation!
Chapter 3 (Supply and Demand) - Written Assignment Surf the web and try to find a...
Chapter 3 (Supply and Demand) - Written Assignment Surf the web and try to find a newspaper article about the equilibrium price of a good or service changing due to a shift in the supply curve or a shift in the demand curve (please use an original example that has not already been covered in the book, power points or videos). Using supply and demand analysis and information from the newspaper articles, explain what is happening in this market that...
Write an abstract and Introduction for the case of Cyber Breach of Target case.
Write an abstract and Introduction for the case of Cyber Breach of Target case.
Go to the web and find a case concerning contract violations. Give a synopsis (at least...
Go to the web and find a case concerning contract violations. Give a synopsis (at least 2 paragraphs) of the article, and give your opinion about the article (one paragraph). You should also include a working link to the article and any references that you use.
A cyber security engineer is installing a WAF to protect the company's website from malicious web...
A cyber security engineer is installing a WAF to protect the company's website from malicious web requests over SSL. Which of the following is needed to meet the objective? A. A reverse proxy B. A decryption certificate C. A split-tunnel VPN D. Load-balanced servers     A cyber security consultant was asked to revise the security baselines that are utilized by a large organization. Although the company provides different platforms for its staff, including desktops, laptops, and mobile devices, the...
Read chapter 11 on personality theories and review the web link. Which theory do you find...
Read chapter 11 on personality theories and review the web link. Which theory do you find most interesting? ( i.e., Freud, Adler, Erikson, Jung, and Horney). Describe and explain one personality theory. please follow this link before doing this assignment : https://www.verywellmind.com/what-is-personality-2795416
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT