What advice would you give gray and his clients

Assignment Help Computer Engineering
Reference no: EM133422723

Question: In your last meeting, Paul Gray mentioned he was concerned about the security of his clients and their own management of passwords and accounts. Improper password management can lead to cases of fraud and misuse of the system.

One such type fraud is that victims' account passwords can be stolen and their share trading accounts can be misused for making unauthorized transactions that result in the victims making losses. This crime can be executed by the suspect installing key loggers in public computers, such as cyber cafes or airport lounges, or in the victim's own computer. Unsuspecting victims use these infected computers to log in to their online banking and share trading accounts. The passwords and other information pertaining to the victims are e-mailed to the suspect. In such cases, it is often difficult to prosecute the perpetrators, and the existing set of controls is inadequate to fight this type of computer crime.

The perpetrators may also be juveniles. The law understands the immaturity of juveniles and shows leniency toward crimes committed by juveniles. Crimes committed by juveniles can cause the same damage to the economy as the ones committed by a mature individual.

Based upon the scenario above, answer the questions below.

Answer the following questions:

  • How would you advise Gray's clients to manage their passwords and usernames for the account to minimize the risk of fraudulent use?
  • What advice would you give Gray and his clients regarding the online use of personal information? Why is online privacy an important consideration? Justify your position.
  • In your opinion, which are the two most critical reasons for the difficulty in prosecuting the perpetrators of computer crimes? How is the situation complicated if the attack is carried out in a different nation than the one in which the victim or attacked system resides? Justify your answer.
  • Do you think that the law should be modified to bring juveniles under the legal net? Justify your answer.

Reference no: EM133422723

Questions Cloud

How the brown decision affected us education : Explain the basic nature of each decision, and tell how the Brown decision affected U.S. education.
What are the additional means available for rp : What are the additional means available for RP to get more information (attributes) about the subscriber?
Explain helds feminist theory of society : Explain Held's Feminist Theory of Society and why she labels it a feminist theory, including an explanation of the theory she is criticizing.
Describe the nine attributes a project manager : Describe the nine attributes a project manager must demonstrate to effectively manage a team. And example of when each function might be important
What advice would you give gray and his clients : What advice would you give Gray and his clients regarding the online use of personal information? Why is online privacy an important consideration
List the steps involved in an action potential moving from : List the steps involved in an action potential moving from thefax terminal of the pre-synaptic hebron to the gendrites ofthe pos ssynaptic neuron
Should be forbidden according to an ethical theory : Are there actions that should be forbidden according to an ethical theory, but are not clearly banned by this initial formulation of the categorical imperative?
What is a criticism against biocentrism : What does the biocentrism argument claim? And why does being alive have value for the biocentrist? What is a criticism against biocentrism?
Explain the five process functional areas that comprise : Explain the five process functional areas that comprise the project management framework. Be sure to describe the main objectives of each functional area. Also,

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd