.

Wednesday, May 8, 2019

Cybercrime Research Paper Example | Topics and Well Written Essays - 1000 words

Cybercrime - Research Paper ExamplePeople want their personal information to persist that way, personal. But can this really be achieved? Daily there are headlines telling us of further another story of information creation stolen by a criminal or looked upon by the government. thithers also the issue of wiretapping phones and having hidden credentials cameras. Some time ago, AT&T mentioned, slice account information may be personal to you, these recordsare owned by AT&T and it may disclose such records to protect its legitimate business records, safeguard others or respond to sound process. (Lamb, 2011) As history shows, there are truly malicious people among us, and even the most meticulous people can make mis gives, and security experts are becoming very wary of the privacy futurity for America (Marks, 2008). With such statements, its easy to feel that privacy may as well befit a thing of the past. Cybercrime can be done in different ways and can conk anywhere. There are two categories of cybercrime. The first type involves crimes in which information and communications technologies are the station of offenses. Examples of this are computer vandalism, viruses, and the like. The other type involves crimes where technologies are used as tools to commit an offense, such as computer hacking. These two types are the umbrella categories, but there are many other subcategories gnarly in cybercrime. The computer may be the agent of the crime, the facilitator of the crime, or the target of the crime. The crime may take place in one location or sometimes in a network of locations. The repeal results of this type of crime include, to name a few, cyber drug trafficking, child pornography, identity theft, and phishing. But exactly what is being done to fight this? One may ask. The Presidents Critical Infrastructure Protection progress (PCIPB) has come up with a draft plan for upgrading the nations cyberspace infrastructure. This strategy calls for the cooper ation of syndicate computer users, business users, state and local governments, with the overall goal being empowering all Americans to secure their portions of cyberspace. The kill of the plan requires six steps, they being educating and creating awareness among users of cyberspace, producing more secure technologies, developing a large and qualified cyber security workforce, fostering responsibility among individuals for security at all levels, increasing accountability and updating security practices, and finally developing early warning and sharing of information that testament help with early sensing of attacks and leading to the appropriate response. The US also seeks to ask for the participation of foreign counterparts as well in a peer-to-peer dialogue that aims to make an effective business case for cyber security and attain successful convey for partnering with governments on cyber security. (Washington File, 2002) Other states have enacted what is known as a securit y freeze legislation which allows its citizens to charter their credit files against anyone who tries to open a new(a) account or gain new credit, and theyre hoping this will keep thieves from exploiting stole Social Security numbers. (Lamb, 2006) There are also propositions of making of a new internet. The whole notion of privacy and security has become so elusive that the

No comments:

Post a Comment