Carla Murray Timothy Broyles The Number Of Research Paper

PAGES
8
WORDS
2420
Cite
Related Topics:

Carla Murray Timothy Broyles

The number of online security breaches is increasing day by day. For instance, with the Sony Playstation data breaches to millions of small breaches; something must be done to protect the online security of citizens as well as our own government (Sony Playstation System Hacking). The question then becomes who is going to do it? Can the American citizens trust the United States government to ensure their security and thereby their very safety? In light of the fact that the Michigan police force has recently been found to use a forensic cell phone reader or Cellebrite upon routine traffic stops, the ACLU has called into question the ethics of seizing such information without probable cause. Are cell phones merely a tracking device as far as the police force is concerned? Does this not violate the Constitutional right we are guaranteed by our government? Most recently a back door was found in the iPhone that allows anyone who knows about to track the person who owns the phone or whoever is carrying that phone (Reynolds). "Powerful, new technologies are creating new challenges to security online" (Marshal). Through my research I hope to explain how serious of a problem we as Americans are facing. Who will be our just protector? Is our government strong enough to protect us little guys and them as well? The benefits of this research paper are to give people knowledge and hopefully a small sense of outrage that will bring about a change in thinking. With great success it can help people to make themselves knowledgeable and aware that these problems exist and possibly prod them into taking action. The Playstation incident, iPhone backdoor, as well as the Michigan PD should all be enough cause for anyone to think critically about this. Americans must take steps to ensure their cyber safety against threats foreign and domestic and the United States government must do the same to protect its citizens and the whole world. Education and government action can both play a critical role in this, and these aspects will be outlined in this paper.

In Dan Brown's Novel The Digital Fortress, many of these issues are addressed through fiction; especially writing backdoors in codes because they think no one will notice. This is not fiction and people should not always behave and accept what is told to them; they should not always treat it as gospel and take a small step in returning to use the brain that God gave them. Dan Brown's novel addresses the basic issues faced by all computer users; that of computer and Internet crime. There are still so many different crimes that can be committed through the internet, as anyone can access it. Because the internet has a wide range of scope, the government is having a hard time enforcing laws regarding access. This is the reason why non-profit organizations specializing in computer crimes are of great benefit these days. They can provide support, solutions, and other resources to help fight against these illegal acts. Education and correct information regarding these problems and activities can also avoid complicated situations in the future.

Software developers are creating new ways to detect and eliminate viruses from our computers. When compared to other computer crimes, this can be the least cause of worry because there have been a lot of solutions in the market for viruses today. Even if encountered and the virus causes serious damage, computers can always be replaced and data can and should always be stored in its hard form or in a storage device. The only major difficulty viruses can bring is when a business or establishment has to stop its function because all hardware and systems are broken and cannot be used. This can lead to loss of income and quality of work (Hanson). These types of crimes should be taken seriously by everybody, as well as by the government. Awareness and education should be provided to every community so as not to worsen the problems. The longer it is ignored or taken for granted, the more that the situation can become complicated. Computer safety should always be done, especially the young adults who are the ones who spend more time using it.

A worm replicates and slithers itself in network connections. It affects all machines connected to the network taking up space, which in turn slows the machine or computer down. Fortunately, this does not change or delete files. It is also not a virus because it does not depend on applications or programs to spread. In 2001, the worm Code Red caused a big fuss in the industry. It works by replicating within Microsoft's Internet Information Services and Microsoft Index Server 2.0 or the Windows 2000 Indexing Service. Another type of...

...

It disguises itself as something that is not harmful but when loaded, it has the ability to obtain information like passwords or it can provide access to a hacker. Some types of Trojans are remote access Trojans (RAT), backdoor Trojans (backdoors), IRC Trojans (IRCbots), and keylogging Trojans. There are numerous other viruses out there but it is fortunate that software companies have developed programs that can scan, detect, and delete these malicious viruses. It is always safe to install an anti-virus software, which are readily sold in the market by their respective developers. Aside from this, being extra careful can also help. When a program is from an unknown source, it is better to avoid it. Electronic mail attachments, which contain an executable program should not be downloaded, especially if it looks suspicious or if the sender is not known. Another thing that should not be done is to avoid forwarding e-mails that can be considered as junk because this is where the spreading of viruses can start. Nobody is safe from these types of attacks; not even the government. For instance, "attempted attacks on Pentagon computers can number tens of thousands every year" (Marshall)
There are numerous ways established for preventing malicious computer programs as a cyber crime activity. The most common measure is the creation of awareness among the general public and institutions on how to identify and mitigate being affected malicious computer programs (Katel). To realize this preventive measure, network software scientists have engaged in numerous researches; developing highly intelligent network security software. Indeed, some software such as antivirus are commonly found free in the internet. Such are serving the crucial purpose of mitigating infection of computer networks by malicious computer codes such as virus and worm among others.

Still, this intelligent network security software brings with them the ability to identify and deny access of systems by unauthorized users. According to available research findings on the effectives of malicious computer programs, it is clearly established that some forms of these programs which are hard to control. In a move to protect the integrity of information technology in the society, it is a common practice for highly sensitive institutions to close down their networks upon realizing any errant behaviors. It is worth noting that such moves are instrumental in ensuring the continued illegal access of networks by hackers. This is usually followed by a change of the overall access security codes and other check requirements. Indeed, for security codes of highly sensitive institutional networks, constant changing is recommended to reduce access chances by hackers.

The process of detecting and prosecuting cyber crimes is quite complex. This has been closely attributed to the fact that offenders in these crimes employ high sophisticated technologies. It is commonly claimed that thieves are usually ahead of technology. Another problem compromising the process of detecting and prosecuting malicious computer programs crime offenders is low rates of reporting such crimes by the victims (McDowell). Such have also been associated by the failure of network company providers to cooperate with the law enforcement in identifying such incidences. Despite these drawbacks, the war on malicious computer programs as a cyber crime activity has employed a number of methods (Hansen).

First is the use of computer forensic investigation practices to qualify evidence of suspect malicious computer program offender. This process involves technological analysis of collected data by forensic computer scientists. It is to be underscored that according to existing laws such as the Intellectual Property Law and Electronic Communication Privacy Law provides for legal suits against the programmers and distributors of malicious computer programs. Another commonly used measure in detecting cyber crimes is the tapping of communication networks by law enforcement agents. Although this method has received heavy critics for interfering with the privacy and confidentiality of communication, it serves great purpose in mitigating unwarranted access of sensitive networks.

The Patriotic Act of 2001, which allows for government surveillance of the internet, is aimed at mitigating terrorist activities. "Massive internet-accessible databases are making it corporate and government online snooping at a scale unprecedented before." (Clemmett). There are benefits to this snooping, though, as far as protection is concerned. According to the provisions of the Act, law enforcement is given legal authority to intercept internet…

Sources Used in Documents:

Works Cited

Clemmitt, Marcia. "Privacy in Peril." CQ Researcher 17 Nov. 2006: 961-84. Web. 22

May 2011.

Hansen, Brian. "Cyber-Crime." CQ Researcher 12 Apr. 2002: 305-28. Web. 22 May 2011.

Katel, Peter. "Identity Theft." CQ Researcher 10 June 2005: 517-40. Web. 22 May 2011.
<http://www.popularmechanics.com/technology/gadgets/news/are-smartphone-searches-legal-5603061>.


Cite this Document:

"Carla Murray Timothy Broyles The Number Of" (2011, May 25) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/carla-murray-timothy-broyles-the-number-118760

"Carla Murray Timothy Broyles The Number Of" 25 May 2011. Web.16 April. 2024. <
https://www.paperdue.com/essay/carla-murray-timothy-broyles-the-number-118760>

"Carla Murray Timothy Broyles The Number Of", 25 May 2011, Accessed.16 April. 2024,
https://www.paperdue.com/essay/carla-murray-timothy-broyles-the-number-118760

Related Documents

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Cybercrime Is a Concept That
PAGES 10 WORDS 3003

Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated