Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.


This is a preview of the 8-page document
Read full text

This makes it harder for unauthorized users to guess. Uer interface options like ‘Remember Password’ should be avoided at all costs. Soring of passwords should be done in an encrypted way to ensure their security. Oce encryption has been done to passwords, Acess Control Lists (ACL) is used to control unauthorized access. A insecure wireless network offers avenues for a system to be attacked easily. W-Fi networks and Bluetooth make it easy for a quick attack on a system. Wreless network can be secured using hotspots and passwords users.

Tis can be done using Firewalls and VPN for connectivity. Een though FBI and other organization involved in cyber crime are unwilling to disclose the type of methods they use to track down system attackers (they fear that the offenders may know their tactics), ivestigations involve locating the IP address used in the crime and the ISP address that hacker used. Iternet Service Providers store all records and therefore locating the fraudulent act is not hard provided the ISP is known. Hwever, IPs differ in sizes, lrger ones for as long as a month while the smaller ISPS dispose off their data very quickly in order to cut down costs.

Terefore, a investigator ought to move fast. (riffith, ‘ow to investigate cyber crime’)Once the PCs of the suspect have been seized, frensic experts are called to work. Frensic experts come up with what is called a ‘true copy’ of the drives. Tis process helps to identify all deleted items that may not be present in the drives. Tere are also softwares used in the forensic exercise. faster of information, te forensic experts narrow down to what they are looking for and not just the general information as this may take a whole lifetime to achieve.

I the case involves money laundering, ten the experts will concentrate on data involving money. (riffith, ‘ow to investigate cyber crime’)Laws dealing with cyber crime are mainly divided into two: Te National Stolen Property Act (from 1934) and The Economic Espionage (an act of 1996). Te latter came as a result of the government’s inability to curb all cyber crimes like infringements.

Tis act criminalized all forms of trade secret theft. Te National Stolen Property Act is by no means related to cyber crime, bt federal. ..

This is a preview of the 8-page document
Open full text

Related Topics

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Engineering and Construction, Agriculture
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Military, Technology
Hire a Writer
preview essay on MIS AND SECURITY
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us