We can work on cyber crime discussion

cyber crime discussion

 

 

 

 

 

 

 

 

Cyber Crime Discussion

Name of Student

Name of Instructor

Institution

Date

 

In one of the headlines of an article in 2013, Anonymous Hacks Department of Justice Website had threatened to launch ‘multiple warheads’. According to this article, a hacker by the name Anonymous had been linked with hacking of the United States Sentencing Commission website and managed to get away with sensitive information. In this case, the computer had been used as the main target of crime. According to Maras (2015), such cybercrimes where a computer is used as a main target are classified as category I cybercrimes.

Reports also indicated that the attack on the United States Sentencing Commission website was motivated by an earlier contravention of the 8th Amendment that prohibited against any form of cruel and unusual punishment on a hacker who had been previously arrested having been suspected for similar crime. Upon his arrest, the suspect had been promised to be set free on condition that s/he helped bring his accomplices to book, failure to which s/he was to face a jail term of 35 years. Having feared for the unknown regardless of his/her choice, the suspect resorted to take his own life than live to bear the consequences of either option.

As at the time of accessing the article, the anonymous propaganda was still available and could be accessed by members of the public. It was also revealed that after successfully hacking the system, Anonymous extracted the most sensitive information including the famous ‘warheads’ that are named after the Supreme Court Justices and thereafter threatened to spill it to the general public.

In order to avoid such cyber-attacks and other related crimes, I will take measures such as ejecting the hard drive and files that contain the most sensitive information from the internet server. This is one of the most effective measures especially when the hard drive completely unplugged from the server and in effect allowing only for manual access. I will also work to bar any remote access and add a redundancy to ensure that no form of access is permitted, just as in the case of Mission Impossible movie.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Maras, M. H. (2015). Computer Forensics. Jones & Bartlett Publishers.

 

 

This entry was posted on February 27, 2018 at 5:36 am and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.

Is this question part of your Assignment?

We can help

Our aim is to help you get A+ grades on your Coursework.

We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals

Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples