Meaningful distinction be drawn between hacking and cracking

Assignment Help Business Law and Ethics
Reference no: EM133190956

Quesiton 1. Why do many in the computer community oppose the use of "hacker" to describe cybercriminals? Can a meaningful distinction be drawn between hacking and cracking? What kind of hacking can be justified on either legal or ethical grounds?

Question 2. What implications does the conviction of the four cofounders of the Pirate Bay Web site in 2009 have for international attempts to prosecute intellectual property crimes globally? Should the four men also have been required to stand trial in all of the countries in which copyrighted material had been downloaded from their Web site? Will the outcome of the Pirate Bay trial likely deter entrepreneurs, worldwide, from setting up future P2P sites that allow the illicit file sharing of copyrighted material? What is your opinion of the case?

Response

Nowadays the practice of using automated software has served law enforcement and courts very well because seasoned officers and prosecutors have been able to use their well-developed policing expertise to reveal sound physical proof, and augment that proof with sound digital evidence from investigative software. But for the digital evidence to be admissible in court the investigative software should meet what many experts call "trier of fact" of requirements and expectations. This means the process used to reveal the digital evidence, and chain of custody to maintain its integrity, must be repeatable and able to yield the same results (Hayes, 2015). Ultimately, the software should be capable of, and have the veracity to, determine the facts amongst the body of digital evidence in order to accurately and reliably reveal when something existed or some event occurred. Experts like Guo, Slay, and Beckett (2009) explain that forensic tools should include a verifiable validation and verification framework that can be tested. These experts' opinions are in line with Hayes (2015), who explains that, when the evidence is tested, the results should be able to be recreated. For this reason, it is critical the reliability of the investigation software is tested with a set of reputable standards and approved by organizations with authority.

The Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) provides such reputable standards, in particular a methodology for evaluating investigative software methods by establishing general tool requirements, research protocols, test parameters, test sets and hardware testing. Their approach is based on well-known international methodologies for conformity research and quality testing. The results reveal the necessary information for toolmakers to improve investigative software, for users to choose the most appropriate investigative software, and for interested parties to understand the investigative software capabilities (NIST, 2019). The latter, understanding capabilities, is of high importance because it determines whether the investigative software can consistently recreate accurate and reliable test results; in line with the recommendations from experts like Hayes, Guo, Slay, and Becket. There are other organizations that utilize reputable standards and are accepted by authoritative entities such as the Federal Bureau of Investigations (FBI) civil society organizations, and agencies and entities of the United Nations and Inter-American systems. These include the Scientific Working Group on Digital Evidence (SWGDE), the International Organization on Digital Evidence (IOCE) (OAS, n.d.), and the American Society of Crime Laboratory Directors (ASCLD) (FBI, 2000). These organizations agree that investigative software should include key capabilities such as revealing direct evidence on the machine, associating a machine with data, providing investigative leads, revealing evidence that corroborates or refutes allegations or alibis, and revealing behavioral evidence (OAS, n.d.).

Three tools that follow these well-established standards and includes the internationally agree-upon set of capabilities are EnCase, The Forensic Toolkit, or FTK, and X Ways Forensics (XWF) (InfoSec, n.d.). EnCase is designed for forensics, digital security, security investigation, and e-discovery primarily from recouped or seized hard drives (InfoSec Institute, n.d.). But it's very expensive, going over $3,500 for a single license (ITClick, 2020). FTK is an investigation package great for hard drive scans and string searches, as well as taking images of the hard disk. But it can't multitask, doesn't display a progress bar to estimate the time remaining, and doesn't have a timeline view (making hard to conduct temporal analysis) (InfoSec, n.d.). Like EnCase, FTK is also pricey (about $4,000), but unlike EnCase, the price buys a perpetual license. XWF is considered powerful since its portable and conducts deep and granular investigations of commercial computers. However, although the price of a perpetual license about $1,000 cheaper than FTK and EnCase, updates will only be included for two years (XWays, n.d.), it's very complex, and would not work without the required dongle (InfoSec, n.d.).

Reference no: EM133190956

Questions Cloud

Write a reflection on personal development in it field : University of Kentucky - You may opt to list and describe the specific items that you believe must be completed in order to achieve your professional goals.
Describe a corporate social responsibility program : Describe a corporate social responsibility program and Do you think the company should be doing this program at all?
Does democratization promote peace : Santa Monica College, Does democratization promote peace and American security, should we expect a decline in the incidence of war
Benefits and challenges of using solar energy vs fossil fuel : GLY 1001 - Florida Gateway College - Analyze and discuss the present-day benefits, incentives and challenges of using solar energy versus fossil fuel in Florida
Meaningful distinction be drawn between hacking and cracking : American Military University - Why do many in the computer community oppose the use of "hacker" to describe cybercriminals? Can a meaningful distinction
Essay topic-tim horton expansion in china : College of Mount Saint Vincent-SWOT is an acronym for strengths, weaknesses, opportunities, and threats. A SWOT analysis is used in strategic planning
Compare fix-rate mortgages and adjustable rate mortgages : Guangdong University - Adjustable rate mortgages contributed to the "housing bubble" and how a fixed rate mortgage could have had a different impact
Calculate the percent contribution of gwp, ap and pocp : University of Idaho - For each source, calculate the percent contribution of gwp, ap and pocp to the overall impact.
Argument about the death instinct : University of Maryland-"To what extent do you believe that Morrison's and Freud' argument is more bleak than Browning's or O'Brien's?

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Would you do as hobby lobby did

In 2010, during very difficult economic times, the Hobby Lobby retail chain with 455 stores in 36 states raised its company minimum wage for full-time employees

  How is a power of attorney used in personal lives

How is a power of attorney used in personal and professional lives? What are some benefits and struggles associated with power of attorneys

  Why should not those who commit guilty act always be held

The law recognizes certain defenses to crime. Why shouldn't those who commit the guilty act always be held accountable for their actions?

  How much will you have saved

If instead of investing in the account, you saved your money in your cookie jar. How much will you have saved?

  What are wilsons rights if any against ruth

Ruth nevertheless sells the chest to Harold. Wilson then discovers these facts. What are Wilson's rights, if any, against Ruth?

  Types of technologies employed

A description of the specific types of technologies employed (e.g., case management software, eDiscovery), and an explanation as to how these technologies are utilized in the courtroom

  Measuring returns, risk assessment

The focus of this assignment is on risk, return and equity analysis. The expectation is that students will develop skills in measuring returns, risk assessment and analysis and valuation.

  Do you agree or disagree with given statement

"A drop in the foreign demand for our exports has a larger effect on our domestic product and income under floating exchange rates than it would under fixed exchange rates." Do you agree or disagree with given statement?

  The juvenile explained that the victim had invited him to

a 12-year-old boy was caught in the act of sexually assaulting a 14-year-old female acquaintance by the victims

  Describe the virtual network structure

Describe the virtual network structure.- What are the advantages and disadvantages of using this structure compared to performing all activities in-house within an organization?

  Key ethical problems raised by the adelphia

Key Ethical Problems Raised by the Adelphia Communications Case

  Ricardos theory of comparative advantage

What is the effect on the pattern of trade predicted by the Ricardian analysis if the number of labor hours required to make a unit of wheat in the United States is reduced by half?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd