Week 10 Discussion
"Information Security and Digital Crime and Terrorism" Please respond to the following:
· From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response.
· From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response.
Please also reply to the student
Latonya Walker
RE: Week 10 Discussion
· From the first e-Activity, identify one to two (1-2) potential ethical challenges that security professionals may face as technology advances, applications become more mobile, and computer criminals become more innovative. Speculate on one (1) solution that security professional could take in order to mitigate the challenge(s) in question. Justify your response.
A potential ethical challenge that security professionals may face as technology advances, applications become more mobil;e and computer criminals become more innovative is that most of the crime comes from the inside so they can cover up their tracks and know to avoid random audits. Also the ignorance of not knowing and leaving information carelessly in the wrong hands by leaving screens up without protection, losing a mobile device with links to sensitive documents, password protection and if working from home, not having enough security or backup. It is hard to speculate a solution that security professionals can take in order to migitate the challenges except to get in a routine. Like if you always lose your car keys one may get in the habit of putting them on a rack, so a routine can be innovated to boost security. As well as randomly performing audits and password changes.
· From the second e-Activity, among the three (3) definitions of cyber terrorism, give your opinion as to the one (1) definition that is the most accurate with regard to information security and infrastructure protection. Next, describe the impact that digital crimes and digital terrorism are likely to have in the future. Provide a rationale for your response.
One definition that i find is accurate is that there is no satisfactory definition because it changes and evolves. When you think of cyber crime it may start with the computer but ends in the homes and business of people. They may start with an income that is funding terrorist acts and then go to recruiting them and having the people to relocate. So it began by the computer but definitely expanded many different ways. The future will had more options and ...
Week 10 Discussion Information Security and Digital Crime and .docx
1. Week 10 Discussion
"Information Security and Digital Crime and Terrorism" Please
respond to the following:
· From the first e-Activity, identify one to two (1-2) potential
ethical challenges that security professionals may face as
technology advances, applications become more mobile, and
computer criminals become more innovative. Speculate on one
(1) solution that security professional could take in order to
mitigate the challenge(s) in question. Justify your response.
· From the second e-Activity, among the three (3) definitions of
cyber terrorism, give your opinion as to the one (1) definition
that is the most accurate with regard to information security and
infrastructure protection. Next, describe the impact that digital
crimes and digital terrorism are likely to have in the future.
Provide a rationale for your response.
Please also reply to the student
Latonya Walker
RE: Week 10 Discussion
· From the first e-Activity, identify one to two (1-2) potential
ethical challenges that security professionals may face as
technology advances, applications become more mobile, and
computer criminals become more innovative. Speculate on one
(1) solution that security professional could take in order to
mitigate the challenge(s) in question. Justify your response.
A potential ethical challenge that security professionals may
face as technology advances, applications become more mobil;e
and computer criminals become more innovative is that most of
the crime comes from the inside so they can cover up their
tracks and know to avoid random audits. Also the ignorance of
not knowing and leaving information carelessly in the wrong
hands by leaving screens up without protection, losing a mobile
2. device with links to sensitive documents, password protection
and if working from home, not having enough security or
backup. It is hard to speculate a solution that security
professionals can take in order to migitate the challenges except
to get in a routine. Like if you always lose your car keys one
may get in the habit of putting them on a rack, so a routine can
be innovated to boost security. As well as randomly performing
audits and password changes.
· From the second e-Activity, among the three (3) definitions of
cyber terrorism, give your opinion as to the one (1) definition
that is the most accurate with regard to information security and
infrastructure protection. Next, describe the impact that digital
crimes and digital terrorism are likely to have in the future.
Provide a rationale for your response.
One definition that i find is accurate is that there is no
satisfactory definition because it changes and evolves. When
you think of cyber crime it may start with the computer but ends
in the homes and business of people. They may start with an
income that is funding terrorist acts and then go to recruiting
them and having the people to relocate. So it began by the
computer but definitely expanded many different ways. The
future will had more options and ways to commit crime, because
the very people that produce the computer programs and the
solutions for bugs, they are also the ones
selling information and leaking out the procedures. Working in
the financial industry it involves a lo of trust and if you do not
keep the people happy that holds your organization together,
then you may be at risk.
Week 10 Discussion
"Organized Crime" Please respond to the following:
· From the e-Activity, analyze the primary manner in which
organized crime may impact all areas in our lives. Next, based
on the text, specify the main ways in which the government uses
Racketeer Influenced and Corrupt Organizations Act (RICO)
3. and Continuing Criminal Enterprise Statute (CCE) to combat
global organized financial crimes like drug trafficking. Provide
one (1) example of the use of RICO and CCE to support your
response.
· Per the text, money laundering has been called the world’s
third largest business. Discuss the overall impact that money
laundering has had on the world’s financial systems. Next, give
your opinion of whether or not the laws in place to combat such
crime are efficient. Justify your response.
Please also reply to the student
Nicholas Mayfield
RE: Week 10 Discussion
It seems like the main way organized crime impacts the lives of
everyone is the effect it has on the economy. Organized crime
makes up a considerable portion of the worlds GDP (15%,
according to the video), and the economy governs every type of
consumer transaction. Criminal organizations tend to deal in
either illicit goods (drugs and prostitution) or counterfeit goods.
Counterfeit goods not only provide not only a source of income
for criminals, but also have an impact on legitimate companies
by hindering their ability to market their products. Illicit goods
are nontaxable, and so are some of the methods of distribution
of counterfeit goods, which causes a loss of revenue for
governments. Criminal organizations also use tax avoidance as a
source of income, such as selling untaxed cigarettes. The RICO
act targets members of criminal organizations, and can be used
to prosecute people who conspire to repeatedly commit criminal
acts in consistent manner, regardless of the organizations
structure. The example in the text of the criminals robbing night
safe deposit boxes illustrates that, under the RICO act, a
criminal enterprise does not have to have a designated leader.
The CCE statute is used to prosecute those that enable a
criminal enterprise to function. An example of this would be the
basenesses that distribute counterfeit goods, such as the online
pharmaceutical companies selling counterfeit medications.
4. The primary impact of money laundering is that it allows for
other criminal activity to evade detection. The most concerning
area of this is what we discussed last week, funding for terrorist
organizations. It stands to reason that, when someone compiles
large amounts of money and are unable to account for where it
came from, they are likely to be involved in illicit activities.
Although it could be argued that the tactics currently used to
prevent money laundering aren't sufficient, as a great deal of
money laundering operations are still successful, it would seem
that the laws in place are efficient, since they are commonly
used to secure convictions. I would suggest that the best way to
crack down on money laundering would be for law enforcement
to come up with more efficient means of monitoring and
detecting this activity, rather than putting new laws in place to
punish those guilty of it.
Bottom of Form
Bottom of Form
Bottom of Form
Bottom of Form