Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.


Show related essays


This is a preview of the 8-page document
Read full text

This makes it harder for unauthorized users to guess. User interface options like ‘Remember Password’ should be avoided at all costs. Storing of passwords should be done in an encrypted way to ensure their security. Once encryption has been done to passwords, Access Control Lists (ACL) is used to control unauthorized access. An insecure wireless network offers avenues for a system to be attacked easily. Wi-Fi networks and Bluetooth make it easy for a quick attack on a system. Wireless network can be secured using hotspots and passwords to reduce users. This can be done using Firewalls and VPN for connectivity.Even though FBI and other organization involved in cyber crime are unwilling to disclose the type of methods they use to track down system attackers (they fear that the offenders may know their tactics), investigations involve locating the IP address used in the crime and the ISP address that hacker used. Internet Service Providers store all records and therefore locating the fraudulent act is not hard provided the ISP is known. However, ISPs differ in sizes, larger ones may information for as long as a month while the smaller ISPS dispose off their data very quickly in order to cut down costs. Therefore, an investigator ought to move fast. (Griffith, ‘How to investigate cyber crime’)Once the PCs of the suspect have been seized, forensic experts are called to work. Forensic experts come up with what is called a ‘true copy’ of the drives. This process helps to identify all deleted items that may not be present in the drives. There are also softwares used in the forensic exercise. For faster retrieval of information, the forensic experts narrow down to what they are looking for and not just the general information as this may take a whole lifetime to achieve. If the case involves money laundering, then the experts will concentrate on data involving money. (Griffith, ‘How to investigate cyber crime’)Laws dealing with cyber crime are mainly divided into two: The National Stolen Property Act (from 1934) and The Economic Espionage (an act of 1996). The latter came as a result of the government’s inability to curb all cyber related crimes like trademark infringements. This act criminalized all forms of trade secret theft. The National Stolen Property Act is by no means related to cyber crime, but federal

This is a preview of the 8-page document
Open full text
Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Technology, Engineering and Construction
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Military, Agriculture
Hire a Writer
preview essay on MIS AND SECURITY
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us