Category: Cybercrime
-
Computer Forensics and Investigations
Other than the two basic types of computer crimes above, what non-computer crimes might a computer forensics examiner get involved with, and how? A computer forensics examiner may be called upon to provide evidence and advice in a court of law. He or she should always gather and preserve evidence according to Federal Rules of…
-
The Hacking of Yahoo in 2013 and 2014
Introduction In the history of computers, Yahoo data breach of 2013 and 2014 was one of the highest data breach levels. Yahoos website encountered a data breach in 2013 and an attack targeted over 500,000 accounts. The hackers used a spear-phishing scheme and gained access to the companys database. This was due to poor security…
-
The Development of New Technologies: Wireless Hacking Techniques
With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions that allow to overcome these…
-
Cybercrime and Ransomware: Literature Analysis
Criminal justice and the processes that it involves is one of the most multi-layered, controversial, and ever topical areas of legal procedures in general. A discussion of trends and significant threats in this field remains a challenge since the classification itself for cybercrimes remains a matter of contest. This paper aims to discuss the problem…
-
Black Hat vs White Hat Hacking
Abstract This paper explores hacking from the perspective of ethics. The ethicality of hacking depends on the motive of the hacker, which also forms the basis for the definition of the different forms of hacking. White hat hackers are ethical according to utilitarianism as they bring utility to the greatest number of individuals. In this…
-
Social Issues Surrounding Cybercrime
Among many social problems that have already been discussed, the issue of rising cybercrime has been on my mind the most. I would like to discuss this issue and the questions that arise from it in more detail. In the world of today, it is difficult to imagine not using technology in some capacity, however…
-
IT Security: Hacking and Its Components
Table of Contents Introduction Main body Conclusion Reference Introduction Currently, one may observe the rapid development of modern technologies that are used in most aspects of human life. IT technologies are engaged not only in many areas of business, including medicine. However, one may use them for negative purposes. Hacker break-ins and extortion of money…
-
Digital Forensics in Law Enforcement
Table of Contents Introduction Discussion Methodology Recommendation Conclusion References Introduction Forensic science has a digital forensics branch that aims to identify, acquire, evaluate, and report on data stored in electronic form. Evidence in the electronic form is a part of every criminal activity, and digital forensics support is critical for investigators. The information can be…
-
Computer Forensics in the FCC vs. Jack Brown Case
Table of Contents Introduction Admissibility of Electronic Evidence Best evidence rule Acquisition Methods Used Data Recovery Notice Evidence Form Sample Warrant References Introduction In todays technology ridden world, computer crime and other related criminal activities are a booming business. Criminals, fraudsters, and even revolutionary terrorists seem to strike at every opportunity, leading either to financial…
-
St. Louis Countys Cybercrime Task Force Plan
Executive Summary The current paper presents a plan for the development of a cybercrime task force for St. Louis County. The plan provides an overview of the most relevant areas of cybercrime threat to assign priorities for the task force, describes its proposed structure, including the required skills of the personnel and a list of…