Discuss about - where cybercrime goes to hide

Assignment Help Management Information Sys
Reference no: EM132136657

Please respond to student 150-250 words ...do you agree or disagree

One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Internet: Where Cybercrime goes to Hide".

These hosting providers know that there is illegal activities uploaded and distributed through their networks, but do nothing to stop it.

These providers do not comply with national or international laws and the hosting sites are maintained in countries with fewer regulations. With the cloud becoming such a huge part of the hosting market, now a lot of these organizations have more resources to keep their sites live. Law enforcement has a difficult time prosecuting these cases because of different jurisdictions, laws, and other issues.

Bullet proof hosting is very profitable for these organizations, and they prefer to pretend that they don't know what's being hosted (The Most Dangerous Town on the Internet: Where Cybercrime Goes to Hide, 2017). For these hosting organizations, the issue is that they want total control and their customers to have total control.

The problem is that by doing this, they are supporting some very bad organizations and it enables for cyber crime to continue to exist. By eliminating these hosting services, it will not solve the problem, but at least it helps to cripple their reach and forces these organizations to work harder.

The most dangerous town on the internet: Where cybercrime goes to hide [Video file]. (2016).

Reference no: EM132136657

Questions Cloud

What internal policy changes or new policies do you feel : What internal policy changes or new policies do you feel will need to be implemented to more effectively address the issue? Be sure to justify your response.
Discuss both pros and cons to getting type of testing done : Based on the information provided to you in the resources for this week, discuss both pros and cons to getting this type of testing done.
Categories of cyber terrorism and information warfare : Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address.
Social media and personal identity : Social Media and Personal Identity. Reflect on any aspect of this theory you find interesting or relevant to your relationships.
Discuss about - where cybercrime goes to hide : The idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Internet: Where Cybercrime goes to Hide".
Formulate your promotional strategy : Formulate your promotional strategy. How will you make your channel known?
Explain what the client can expect from your services : Graphically depict and effectively promote your company's structured development and services using Visio or its open source alternative software.
Analyze wireless applications and the degree of support : Analyze wireless applications and the degree of support and adoption of wireless devices for each industry.
What part of the video caught your attention most : Describe the topic of the video. What geographic content did it cover? What part of the video caught your attention most? Why?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain how quantum cryptography works

Explain how quantum cryptography works and what role you think it will play in the future of cryptography.

  Describe the examinations performed on the items submitted

Forensic evidence reports follow a standard format, with specific content, to describe the examinations performed on the items submitted for analysis.

  Importance of a supply chain strategy

Describe what a supply chain is and the importance of a supply chain strategy. Identify at least four key drivers of a supply chain strategy and the important ingredient of each to a supply chain strategy.

  How would compose a team for completing a course

How would compose a team for completing a course/work project in terms of the three dimensions listed above.

  How was the organization impacted

Describe the disaster recovery and business continuity that the business had in place?What were the lessons learned?

  Develop form to capture the lessons learned from the project

Calculate the project's earned value (see reading - Kloppenborg ) and discuss how this affects your project. Develop a form to capture the lessons learned from this project, to be completed by all project team members.

  Compute the cost variance and schedule variance

Identify at least four (4) attributes of the mobile application development project that can be measured and controlled

  Prepare a formal academic report about project documentation

My topic for research paper is: "Smart Homes using AI virtual assistants with applied Smart devices".

  Discuss the cost estimation in software development

Predict the challenges of cost estimation for software development projects where requirements are usually not clear in early stages of the project. Argue whether or not the fluidity of requirements introduced by agile methodologies contributes to..

  Explain the difference between data and information

In 350 words explain the difference between data, information, and knowledge. Explain why information is a critical organizational asset, and explain the security professional's role in protecting this critical asset

  Pros and cons of using cloud computing in healthcare

pros and cons of using cloud computing in healthcare

  Explain the importance of mis in relation to data-driven

Revise the previous proposal based upon the comments from your instructor. Explain the importance of MIS in relation to data-driven decisions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd