What advice would you give gray and his clients

Assignment Help Computer Engineering
Reference no: EM133422723

Question: In your last meeting, Paul Gray mentioned he was concerned about the security of his clients and their own management of passwords and accounts. Improper password management can lead to cases of fraud and misuse of the system.

One such type fraud is that victims' account passwords can be stolen and their share trading accounts can be misused for making unauthorized transactions that result in the victims making losses. This crime can be executed by the suspect installing key loggers in public computers, such as cyber cafes or airport lounges, or in the victim's own computer. Unsuspecting victims use these infected computers to log in to their online banking and share trading accounts. The passwords and other information pertaining to the victims are e-mailed to the suspect. In such cases, it is often difficult to prosecute the perpetrators, and the existing set of controls is inadequate to fight this type of computer crime.

The perpetrators may also be juveniles. The law understands the immaturity of juveniles and shows leniency toward crimes committed by juveniles. Crimes committed by juveniles can cause the same damage to the economy as the ones committed by a mature individual.

Based upon the scenario above, answer the questions below.

Answer the following questions:

  • How would you advise Gray's clients to manage their passwords and usernames for the account to minimize the risk of fraudulent use?
  • What advice would you give Gray and his clients regarding the online use of personal information? Why is online privacy an important consideration? Justify your position.
  • In your opinion, which are the two most critical reasons for the difficulty in prosecuting the perpetrators of computer crimes? How is the situation complicated if the attack is carried out in a different nation than the one in which the victim or attacked system resides? Justify your answer.
  • Do you think that the law should be modified to bring juveniles under the legal net? Justify your answer.

Reference no: EM133422723

Questions Cloud

How the brown decision affected us education : Explain the basic nature of each decision, and tell how the Brown decision affected U.S. education.
What are the additional means available for rp : What are the additional means available for RP to get more information (attributes) about the subscriber?
Explain helds feminist theory of society : Explain Held's Feminist Theory of Society and why she labels it a feminist theory, including an explanation of the theory she is criticizing.
Describe the nine attributes a project manager : Describe the nine attributes a project manager must demonstrate to effectively manage a team. And example of when each function might be important
What advice would you give gray and his clients : What advice would you give Gray and his clients regarding the online use of personal information? Why is online privacy an important consideration
List the steps involved in an action potential moving from : List the steps involved in an action potential moving from thefax terminal of the pre-synaptic hebron to the gendrites ofthe pos ssynaptic neuron
Should be forbidden according to an ethical theory : Are there actions that should be forbidden according to an ethical theory, but are not clearly banned by this initial formulation of the categorical imperative?
What is a criticism against biocentrism : What does the biocentrism argument claim? And why does being alive have value for the biocentrist? What is a criticism against biocentrism?
Explain the five process functional areas that comprise : Explain the five process functional areas that comprise the project management framework. Be sure to describe the main objectives of each functional area. Also,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create two sounds one a square and one a triangle

Create two sounds, one a square and one a triangle, using the same inputs. Add the sounds together, with blend percentage of square and 100-blend of triangle.

  Create a screen capture of your slides with you talking

Create a screen capture of your slides with you talking. Ice Scream Screen Recorder has a free version that records up to 10 minutes.

  Write a program that allows the user to specify a triangle

Write a program that allows the user to specify a triangle with three mouse presses. After the first mouse press, draw a small dot.

  What is footprinting and is it important

This hands-on guide demonstrates how to conduct "Footprinting of a network" The best way to ensure your infrastructure is secure is to understand the steps.

  What are the possible values of salt

What are the possible values of salt?, What is the hash of password + salt for salt =110? Explain the protocol for Authentication.

  Describe the overall hierarchy of your proposed classes

Briefly describe any relationships that might exist between your classes; and briefly describe the overall hierarchy of your proposed classes.

  Explain the application development methods

Application Development Methods - IT Capstone 1 There are various System Development Methodologies. These include but not limited to.

  Write a program in mips to accept a string from a user

Write a program in MIPS to accept a string from a user, reverse that string and print it out to the user.

  Describe efficient algorithm for flight scheduling problem

Describe an efficient algorithm for the flight scheduling problem. In this problem, we are given airports a and b and a time t.

  Explain the history of cryptocurrency

Apply the knowledge obtained in this chapter and prepare a research paper in MLA style named: History of cryptocurrency with at least 4 pages long document.

  Determining the smallest values in dictionary

Explain an efficient method for determining the k smallest values in the dictionary which are greater than low. Your method must take much less than O (n) time whenever k is much less than n. Analyze the time for your method.

  Which sector of it infrastructure does vulnerability affect

Securing applications is an integral part of an overall security plan. Even if you have a secure IT platform, installing an insecure application can cause.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd