Discuss role technology plays as landscape for cybercrime

Assignment Help Computer Engineering
Reference no: EM133523465

Homework

Purpose

This homework is intended to help you learn to do the following:

1) Examine digital threats in the context of information security and compliance.

2) List the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.

3) Describe their responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4) Interpret jurisdictional laws and regulations as they relate to intellectual property, privacy, and criminal proceedings.

5) Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

6) Assess an organization's compliance with regulatory requirements and ethical standards.

7) Integrate ethical practices in real world business scenarios.

Overview

Bjorn Daniel Sundin and Shaileshkumar P. Jain, along with others, owned and operated Innovative Marketing, Inc. (IM), a company that sold antivirus and related software to customers in 60 countries. The headquarters was based in Belize with another location in Kiev, Ukraine. IM quickly grew in response to the great demand by customers who contacted IM because their computer had shown a message indicating a malware infection. Between 2006 and 2008, IM made hundreds of millions of dollars in profits and continually grew its organization and number of employees. In 2008, the Federal Trade Commission began investigating IM after having received more than 1,000 complaints from customers. To their surprise, IM's computers were not password protected. The investigation showed that the customers of IM were in fact their victims, as IM itself had infected the computers with a malware. The malware showed a fake warning message about a virus infection and then prompted the victims to click on a link to IM to buy virus removal software for $30 to $70. The computers never had a virus, and the sole purpose of the company was the development and use of "scareware" as a means of defrauding individuals and companies. In 2008, the FBI indicted Sundin and Jain on 24 counts of wire fraud, conspiracy to commit computer fraud, and computer fraud. They are on the FBI's Most Wanted list. They continue to be fugitives, hiding in countries that do not pursue cybercriminals.

Action Items

A. Refer to Project Overview for an overall picture of the project.

B. Create a report (between 1500-2000 words and 1.5 spacing) that addresses the following questions:

1. Discuss the role that technology plays as a landscape for cybercrime.

2. Drawing on the above case, and making appropriate assumptions as you see fit, explain ways that IM took advantage of its client's trust in committing crimes. For example, remember to include IM's unauthorized access to its clients' data, breaking into their privacy.

3. Research a federal act that may be used in a court proceeding to prosecute IM's executives.

4. Construct a hypothetical case against these individuals based on the steps for data preservation and evidence integrity.

Reference no: EM133523465

Questions Cloud

Describe the crimes committed by the chosen suspect : Explain the related security laws based upon the chosen suspect. Describe the crimes committed by the chosen suspect.
Examine the goals that you may want achieve : Examine the goals that you may want achieve over the next 5 years, these should include both personal and professional goals. Providing a jusñfication
Explain why not everyone needs access to the internet : If yes, who should provide the services and education and who should pick up the tab? If no, explain why not everyone needs access to the Internet.
Ethical considerations for working with people : List three legal and ethical considerations for working with people with disabilities?
Discuss role technology plays as landscape for cybercrime : Discuss the role that technology plays as a landscape for cybercrime. Research a federal act that may be used in a court proceeding to prosecute IM's executives
Screening procedures at birth differ from state to state : How do screening procedures at birth differ from state to state? How often should lipid screening be done? At what age should adults start having lipid screens?
What in the article or chapter reading surprised you most : Why is it important that proper training be provided to employees? What in the article or chapter reading surprised you the most?
Manage work health and safety : Develop an action plan template that could be used to document health and safety improvement opportunities.
How the knowledge skills or theories of course have applied : How the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a main function that outputs the result of calling

Write a simple C++ program that defines two different functions (f and g) that both take two int values and return an int. value.

  Implenting a code

Write down a fragment of code which reads a line of text (using getline) from standard input containing of a last name followed by the first name

  Design a new website and you are interviewing

Explain how your questions help you understand how they navigate the sides and have the styling impacts their experience.

  Write a report about memory management ram technologies

Write a report about Memory Management: RAM technologies. It has been widely acknowledged that many students will work in jobs that are not known yet.

  Write a program that tests your macro

Write a procedure named Str_concat that concatenates a source string to the end of a target string.

  Define various types of reading materialb using classes

Design and implement a set of classes that define various types of reading material: books, novels, magazines, technical journals, textbooks, and so on.

  What are the contents of the a register after the execution

What are the contents of the A register after the execution of this instruction? XXXX=XXX XXXXXXXX XXXXXX== and XXXX=XX= XXXXXXXX XXXXXX==.

  Describe which cloud architectures you would employ

Cloud Computing Assignment - Your team has been engaged to provide a risk assessment for MetaSoft in their planned move to a Hybrid Cloud strategy

  Design a privacy policy that you would like to see added

Design a privacy policy that you would like to see added to the site. How should the policy be worded? Where (location on the site) would you add this

  What speedup is possible with pipelining

What is the maximum execution rate without pipelining? What speedup is possible with pipelining?

  How does audit manager or organizational management design

How does an audit manager or organizational management design, develop, and implement a career development plan?

  Describe pci compliance to the database administrator

In 500 words or more, explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd