QUESTION
Law and Cybercrime
Describe several possible Cybercrime objectives and operational methods that could be employed for abuse of Digital currencies, and the “Internet of Things”.
Examine and Describe laws and practices related to Computer Forensics. Will these laws and practices be effective for emerging cyber crimes you have described above? Explain your answer.
Subject | Law and governance | Pages | 4 | Style | APA |
---|
Answer
Cybercrime and Law
Cybercrime is one of the most challenging technological threat in the modern world. Cybercrime involves the use of technology, especially the internet and other computer networks, to carryout criminal activities. Some of the most common cybercrime activities include identity fraud and cyber extortion (demand for money to execute or prevent an alleged online attack). Objectives of cybercrime include to steal and sell corporate information, theft of monetary or card transaction information and the theft of email and other internet related signatures.
Notably, a cybercriminal is any individual who performs any kind of illegal activity by the use of digital technologies mainly the internet and computers at large. Cybercriminals may employ human behavior knowledge, computer expertise, and other possible services and tools to realize the desired goals. In the contemporary world, most cybercriminals use their hacking knowledge or the ability to decrypt complex codes used during transmission of data and information over the internet (Alotaibi et al., 2019). Hacking is typically a very complex exercise; therefore, most cybercriminals use internal employees to gain at least a hint or starting point in their hacking exercise. The most common avenue is to send an email that would make the employees expose their legitimate authentication details such as passwords (Atlam et al., 2020). These methods are highly employed for the abuse of internet of things and digital currencies.
Computer forensics is mainly used to collect and analyze various techniques for the preservation of evidence from a specific digital device to ensure that the credibility of the data is retained. Computer forensics is, therefore, a tool used to investigate cybercrime (Pavlik, 2017). In light of this, computer forensics supports the existing laws for combating cybercrime. Some of these laws include the cyber security enhancement Act of 2014, the Federal Information Security Management Act and the Computer Fraud and Abuse Act (Pavlik, 2017). The cyber security enhancement Act provides a continuous private-public engagement to ensure credibility of data and information transmitted over the networks.
These laws will be highly effective in dealing with the emerging cybercrimes. For instance, the Computer Fraud and Abuse Act criminalizes certain computer related activities such as unauthorized access of digital device or access to restricted information. These laws are not time-bound but covers all the computer related activities. These laws will be effective in addressing nearly all cybercrimes that will emerge in the future.
.
References
-
Alotaibi, M. A., Alzain, M. A., Soh, B., Masud, M., & Al-Amri, J. (2019). Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. International Journal of Communication Networks and Information Security, 11(3), 424-431.
Atlam, H. F., Alenezi, A., Alassafi, M. O., Alshdadi, A. A., & Wills, G. B. (2020). Security, cybercrime and digital forensics for IoT. In Principles of internet of things (IoT) ecosystem: Insight paradigm (pp. 551-577). Springer, Cham.
Pavlik, K. (2017). Cybercrime, hacking, and legislation. Journal of Cybersecurity Research (JCR), 2(1), 13-16.
Related Samples
The Role of Essay Writing Services in Online Education: A Comprehensive Analysis
Introduction The...
Write Like a Pro: Effective Strategies for Top-Notch Explication Essays
Introduction "A poem...
How to Conquer Your Exams: Effective Study Strategies for All Learners
Introduction Imagine...
Overcoming Writer’s Block: Strategies to Get Your Essays Flowing
Introduction The...
Optimizing Your Online Learning Experience: Tips and Tricks for Success
The world of education...