Cybercrime (Digital Currencies and “Internet of things”)

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  1. QUESTION

     

     

     

    Law and Cyber Crime:

    Describe several possible Cybercrime objectives and operational methods that could be employed for abuse of Digital currencies, and the "Internet of Things".
    Examine and Describe laws and practices related to Computer Forensics. Will these laws and practices be effective for emerging cyber crimes you have described above? Explain your answer.

     

     

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Law and governance Pages 4 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

Cybercrime (Digital Currencies and “Internet of things”)

Technology is daily growing into becoming more significant in every aspect of society; hence there has been a growing need for pumping many resources into enforcing its security. With its increasing importance, technological advancements have become increasingly prone to cyber-attacks perpetrated by individuals who exploit a particular weakness in its compilation/structure. Cybercrime perpetrators are usually after money or for financial gains; they launch cyberattacks, for instance, stealing of data to sell elsewhere or for a ransom of records, and phishing attacks (Brown et al., 2009).

Cybercriminals typically use cryptocurrency or wire transfers for large sums. Some individuals engage in cyberattacks to bridge the competition gap or fully phase out the competitors' advantage. For instance, penetrating a manufacturer's information system would be crucial for blackmailing, competitive knowledge, or sabotage. Additionally, in the current world political witch hunt has been on the rise between people, states or countries; thus, hackers launch cyber-attacks, for instance, to manipulate elections or shut out a specific section or country from accessing the internet or power supply. Moreover, other cybercrime perpetrators engage in the vice to test their skills or for leisure as a way of exploiting a particular weakness in a system (Brown et al., 2009.

Cyber-attacks on digital currencies and the "Internet of Things" have escalated in numerous ways. Among the reasons that the vice has escalated is the increased existence of a poorly protected network that connects physical "things" installed with sensors and other technologies. The increased security exchange laxity has seen increased operational methods used to abuse several network and digital currencies. The methods include the implantation of viruses and other malware attacks on software, network attacks (Botnets), to perpetuate digital currency fraud whereby, for instance, fraudsters transfer their "gains" continuously and secretly. The cybercriminals implant malware on compromised systems-networks, personal computers, and browsers used by digital devices that are used as cryptocurrency miners or inhibitors of access to critical services over the internet. Additionally, the cybercriminals utilize remote pickpocketing of less secure pockets used to store critical credential keys, hence perpetrating cyberattacks on both financial and non-financial accounts (Brown et al., 2009).

With advancements in the computer world, computer forensics has become a critical discipline extensively involved in collecting, analyzing, and presenting information from computer systems, as evidence in the court of law. Several computer forensics laws and practices govern how computer forensics should be practiced (Maras, 2015). The rules include: Wiretap Act, found in the Constitution, permits the ensuring against unreasoning search and seizure; secondly, it permits and enforce security against any sort of self-incrimination (Williams and Levi, 2017). Other laws include Pen Registers and Trap and Trace Devices Statute, and Stored Wired and Electronic Communication Act; these laws oversee the reliability, consistency, and authenticity of the crucial forensic pieces of evidence. They imply that monitoring and collecting data should be done professionally to prevent compromising the evidence, hence enforcing its reliability in the judicial corridors.

The practices mentioned above and laws can, up to some extent, prevent cybercrime incidences against digital currencies and the internet of things. They are useful and effective in curbing the vice more effectively currently. However, the same cannot be implied of the future since there is an emerging trend in which cyber attackers learn new tactics every day and make timely curbing of the vices quite tricky by the respective "cyber guards."

 

 

 

 

References

 

Brown, I., Edwards, L., & Marsden, C. (2009). Information security and cybercrime. LAW AND THE INTERNET, 3rd Ed., L. Edwards, C. Waelde, eds., Oxford: Hart.

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]