StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer crime and forensic - Term Paper Example

Cite this document
Summary
Representations of Islam in the media Grade Course (29th, Oct. 2013) Computer crime and forensic Question 1 My opinion on this matter is that the leakage has served to expose some law violations by the country’s security agencies, which then calls for more attention especially regarding the Patriot Act and its application by the security agencies…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.5% of users find it useful
Computer crime and forensic
Read Text Preview

Extract of sample "Computer crime and forensic"

Download file to see previous pages

The good that he has done is to open up the activities of NSA, as well as its partner in Britain, who violates the privacy of the two countries citizens through secret government surveillances (Ball, 2013). This can be considered good, since it elicits a dialogue on the suitability and the unsuitability of such activities. For this reason, he should be protected by the whistle blowing agency, for having divulged sensitive, but vital information regarding government agencies. However, Edward Snowden has already caused too much damage on the reputation of the government agencies, as well as placing sensitive and classified information that is only accessible by the security agencies in the public domain, thus making the security of the countries prone to many breaches (The Economic Times, 2013).

For such reasons, he may have committed a big blunder, though the result is that, it has opened a public debate on the security agencies breaching of the privacy of private individuals and entities. Thus, instead of considering him as a criminal, he should be treated as a hero who worked towards risking his life, for the sake ensuring that the public is aware of the existing violations. Therefore, he should not be incriminated. References Ball, J. (October 25, 2013). Leaked memos reveal GCHQ efforts to keep mass surveillance secret.

The Guardian. http://www.theguardian.com/uk-news/2013/oct/25/leaked-memos-gchq-mass-surveillance-secret-snowden Greenberg, A. (September 13, 2013). Intelligence Officials Admit That Edward Snowden's NSA Leaks Call For Reforms. Forbes. http://www.forbes.com/sites/andygreenberg/2013/09/13/intelligence-officials-admit-that-edward-snowdens-leaks-call-for-reforms/ The Economic Times. (Oct 26, 2013). Edward Snowden's leaks most serious in US history: ex-CIA official. http://articles.economictimes.indiatimes.

com/2013-10-26/news/43415706_1_intelligence-community-edward-snowden-intelligence-agencies Question 2 Mobile Threats This is a major threat to every individual and even a threat personally, since it entails the installation of a malware on an individual’s mobile phone by criminals, who are able to manipulate the a malware program to be able to purchase items from the app store, without the permission of the mobile devise owner (McAfee report, 2012). The danger associated with this type of threat is that; it can drain the wallet accounts created by individuals for the purpose of online purchase of items from the app stores, since it can easily be installed on the mobile devices of such individuals, whenever they connect to the purchase sites.

Malware This is another threat to the privacy and data accessibility of individuals, through the installation of malfunctioning software that blocks the operating system from being able to access data, thus blocking the accessibility of the data purchased, until the owner of the computer system pays some ransom. This type of software is called the ransomware (McAfee report, 2012). This threat poses a danger to all of us, as well as to self, since it can be done to anyone’s computer. Big-Scale Attacks This is considered a big threat to all of us, since it is a malicious attack not specifically targeted at financial gain, but for the purposes of causing as much damage as possible to the computer systems.

The most worrying aspect is that, the threat targets company systems, which will in turn put the performance

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer crime and forensic Term Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1489544-computer-crime-and-forensic
(Computer Crime and Forensic Term Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1489544-computer-crime-and-forensic.
“Computer Crime and Forensic Term Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1489544-computer-crime-and-forensic.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer crime and forensic

The Increased Need for Digital Forensics

Due to the increased frequency and the changing scope of certain es, especially cyber crime, there has been a heightened demand for digital forensic professionals to support law enforcement and judicial systems at all levels in order to prosecute these crimes successfully.... A digital forensic scientist, searching the digital contents of a computer printer, would look for potential evidence such as time and date stamps, images still retrievable on the printer's paper roller, or even the specific network identity of the printer if it was, indeed, attached to an online network (Ashcroft, 18)....
10 Pages (2500 words) Essay

Characteristics of Computer Forensics

The intruders can escape easily from punishments because of lack of evidences collected normally from a computer crime location.... The antisocial elements are capable of destroying or breaking the… In short, the security of computers and internet is highly important in the present day computer dominated world.... computer forensics is relatively a new area developed in the According to US-CERT (2008), “computer forensics is the discipline that combines elements of law and computer science to collect and analyze data from computer systems, networks, wireless communications, and storage devices in a way that is admissible as evidence in a court of law” (US-CERT, 2008,p....
5 Pages (1250 words) Essay

Forensic Accountants: In the Fight Against the Misuse of Technology

This paper examines the role of forensic accounting in the fight against fraud committed through the use of advanced technology.... The history of forensic accounting can be traced to Ancient Egypt (Krancher et al 12).... Pharaohs officials had a responsibility to render accounts for all their stewardship duties and lapses were investigated using techniques that are similar to forensic accounting today.... forensic accounting was first utilized in an English court in 1817 and a Scottish lawyer offered accounting services that sought to use forensics in investigations in 1824 (Krancher et al 14) The most popular forms of the detection of corporate fraud are usually through allegations by a third party, investigations, senior officer detecting the fraud, accidental discovery, audit and anti-fraud controls (Singleton & Singleton 7)....
8 Pages (2000 words) Term Paper

The Development of DNA Fingerprinting and Computer Forensics

This paper under the headline "The Development of DNA Fingerprinting and Computer Forensics" focuses on the fact that forensic scientists use all the tools and technologies at their disposal to gather and analyze the evidence from criminal investigations.... n the 1880s, fingerprinting was brought to forensic science.... As time has gone on we have developed even more precise ways of gathering forensic evidence, and DNA fingerprinting has become the latest tool forensic scientists use....
9 Pages (2250 words) Assignment

Independent Expert Witness Use of Computer Forensic

computer crime is one of the fastest-growing areas of crime in the world.... The paper "Independent Expert Witness Use of Computer forensic" highlights that generally, now many educational institutions are offering computer forensics degrees, and related education has become a minimum requirement to stay competitive in the industry.... hellip; Computer forensics consulting firms or freelance computer forensic investigators are also hired by large corporations to test the information systems security they have in place....
10 Pages (2500 words) Coursework

Mobile Forensics: Mobile Phones Handsets, SATNA V, PDA, USB

Digital Evidence and computer crime, Second Edition.... hellip; The author explains that mobile device forensics generally is a branch of digital forensics that recovers digital evidence or digital data from a mobile device through the use of forensic sound conditions.... The forensic device would be a digital device that has both internal memory and communication ability.... forensic study of mobile devices has existed, dating from the early 2000s....
8 Pages (2000 words) Assignment

Digital Forensics

This is because a chain of well-documented evidence has to be maintained in order to reconstruct a clear history of the happenings of the crime and find the person responsible (Margaret, 2014)Child pornography is an internet crime against children because they are used as sexual objects (Wortley & Smallbone, 2006).... The investigating officer prepared an affidavit that described the basis for the crime of child pornography and a search warrant limiting the search to the suspect's workspace was issued by a competent court....
7 Pages (1750 words) Case Study

The Key Principles of Cyber Forensics

With the wide availability of the internet, and English language skills being taught at an early level across the world today, criminals do not need to be physically present somewhere to commit a crime.... These stored data while of potentially tremendous value during the investigation, prosecution, and prevention of crime, poses unique challenges to detectives and court prosecutors due to their potentially volatile nature that make electronic data very easy to modify hence suspected criminals may take advantage and tamper with the stored information....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us