SlideShare a Scribd company logo
METHODS TO STOP DIFFERENT CYBER CRIMES
1
Methods to Stop Different Cyber Crimes
People must be well-informed regarding internet scams and
certain vulnerabilities, which permit them to occur sooner or
later. With education, they will be in a situation to help in
prevention of such scams successfully (Hynson, 2012). It is
imperative for people to be familiar with attempts of
cybercrimes and to comprehend correct solutions in internet
practices and solutions. People will learn with education how
to put into practice proper security protocols. When they
develop into social media savvy people and when they learn
how to safe guard their computer devices, cybercriminals will
encounter multiple layers of security, which will limit their
illegal activities substantially.
Firewalls have the capability to protect users and their network
devices against cyber criminals in the first instance of a
attempted breach (Lehto,2013). A firewall monitors the
interchange between a local network or the internet and a user’s
computer. The firewall should be enabled through the security
software or a router. Cybercriminals will be unable to use the
interchange traffic to install malware, which is intended to
compromise the user’s network and computer. If more people
would use firewalls, hackers would be at a chief disadvantage
due to being unable to navigate deeper into a system to obtain
sensitive information and eventually, cybercrime would be
lessened for a time.
Users need to analyze their operating and online systems
continually so they can resolve vulnerabilities (Hynson, 2012).
Internal accounting information or protocols, which lead to
financial information or bank statements, should be checked on
a regular basis in order to recognize the risks and mitigate them
accordingly. It is very difficult for people to curb the flow of
cybercrimes if they are ignorant of the risks in which they face
or the weaknesses, which exist within their systems.
One successful way of slowing the actions of cyber criminals is
by acting like them. This requires law enforcement agencies
such as the Federal Bureau of Investigation (FBI) to assign
special undercover agents to gain access to clubs or groups of
cyber criminals so they can investigate their steps (Hynson,
2012). The investigation method will become more effective by
identifying the source of the problem and in developing a
stronger strategy to cripple the efforts of the criminals.
Cyber criminals can hack into systems without difficulty when
they encounter uncomplicated passwords. Users should use
passwords with at least 10 or more characters so they can
amplify the complexity of logging into the computer system
(Lehto, 2013). It also helps top add in capital letters and special
characters to increase the complexity of a password. In
addition, different accounts should have dissimilar ID’s or
password combinations to avoid giving hackers access to all of
your accounts. The complex passwords should also be changed
on a regular basis so criminals cannot find any type of
consistency in information.
Cross-domain solutions involve different organizations and law
enforcement agencies, which have a combined system ensuring
all cyber activities, are monitored continually (Hynson, 2012).
The verification of automatic and manual access or transfer of
information is authenticated through the hardware and software
of the system for different levels of security classification.
Accessing a variety of domains will be very complicated for
cyber criminals while users can get hold of the information they
require with no trouble.
References
Hynson, C. (2012). Cybercrime. Mankato, Minn: Smart Apple
Media.
Lehto, M. (2013). The Cyberspace Threats and Cyber Security
Objectives in the Cyber Security Strategies. International
Journal of Cyber Warfare and Terrorism (ijcwt), 3(3), 1-18.
VENGEFUL EMPLOYEE2
VENGEFUL EMPLOYEE5
Vengeful Employee
John Stahlschmidt
Grantham University
Running head: VENGEFUL EMPLOYEE 1
Vengeful Employee
Michael Menese a 43-year-old computer programmer used to
reside in Smithtown, Long Island, who was employed with
Spellman high voltage electronic corporation. Spellman
founded in 1947 a company who is a provider of direct current
and precision high voltage power supplies for the medical,
industrial, and scientific communities ("About Us," 2015, p. 1).
Menese worked for this company from May 2008 until January
2015. He left the company after being passed over for
promotion multiple times and became upset with the company
(Secret, 2013, p. 1). His specialty working for the company
was in software programming and systems manager specializing
in developing and customizing software, which the company
used to run its day to day business operations ("Long Island
Software Programmer Arrested for Hacking into Network of
High-Voltage Power Manufacturer," 2013, p. 1).
He was one of two employees who primarily were
responsible for the company’s software running, production
planning, purchasing, and inventory control, giving him a high
access level to the company’s computer network. After giving
his two-week notice Menese, decided to start a vengeance
campaign against the company. Before his access was removed
he installed a program to capture employee’s user login and
passwords. Using this information and the security credential
of at least one former co-worker, he would remotely connect
into the company’s network by using a virtual private network
(VPN) from his home and a hotel near his new employer’s
location.
Soon employees at the company noticed things were
happening with the computer system, which they felt were out
of the ordinary. They were unable to process routine
transactions, receiving error messages instead. Menese bent on
revenge against his former company, exploited his access and
technical knowledge to wage a sabotage campaign against his
former company. He altered the business calendar by a month,
disrupting production and finance operations. Due to this the
company suffered over 90,000 dollars in losses because of
Menese’s intrusions into the system. He also accessed the email
from his former supervisor and would use a separate email
account to send messages to potential candidates for his job not
to accept any job offers from the company (Pickard, 2015, p. 1).
The Company logged a complaint alleging, the defendant
engaged in a 21st Century campaign of cyber-vandalism and
high-tech revenge, hacking into the computer network of the
company Mr. Menese’s former employer to disrupt its
operations, thereby causing tens of thousands of dollars in
damage. United States Attorney Lynch stated “We will hold
accountable any individual who victimizes others by exploiting
computer network vulnerabilities ("Long Island Software
Programmer Arrested for Hacking into Network of High-
Voltage Power Manufacturer," 2013, p. 1).”
Menese was caught 2 May 2013 by investigators who
traced the email account to warn off potential candidates for his
old job. One place it was traced to was an Internet protocol
address, which belonged to Menese new employer. They traced
the calendar changes to a hotel in North Carolina, which
happened to be a very short distance away from Mr. Menese
new job. Checking the hotel records the investigators found
Menese to be staying in the hotel at the time of the cyber
attacks. At the time he was caught, Menese pleaded not guilty.
On 6 March 2015 in the federal courthouse in New York,
Michael Menese pleaded guilty to hacking into his former
company’s computer network. The items brought before the
court in which Mr. Menese did where: The defendant deleted a
line of code in a software program that the victim company used
to calculate work order costs, leading the company to
incorrectly calculate these costs, The defendant remotely
accessed the victim company’s network, read an e-mail sent by
his former supervisor to one of his former colleagues about a
candidate for the defendant’s former position, created the e-mail
address [email protected],” and sent the candidate a message
that stated, “Don’t accept any position from [the victim
company],” the defendant gained unauthorized access to the
victim company’s network and modified a database so it would
appear to be March 2012 rather than February 2012. As a result,
the company was unable to process routine transactions, and the
defendant remotely accessed the victim company’s network and
manually purged a purchase order table, which prevented the
company from converting purchase requisitions to purchase
orders ("FBI," 2015, p. 1)
With the guilty plea Mr. Menese will be charged on 7 July
2015. Mr. Menese will be facing up to 10 years in a federal
prison, as well as a restitution and fine of up to 250,000 dollars.
This shows the federal government is steadfast to vigorous
enforcement of the laws, which govern computer intrusion.
References
Federal Bureau of Investigation. (2013). Retrieved from
http://www.fbi.gov/newyork/press-releases/2013/long-island-
software-programmer-arrested-for-hacking-into-network-of-
high-voltage-power-manufacturer
Pickard, G. (2015). Hacker Pleads Guilty in Digital Retaliation
Campaign. Retrieved from
http://www.topsecretwriters.com/2015/03/hacker-pleads-guilty-
in-digital-retaliation-campaign/
Secret, M. (2013, May 2). Ex-Worker Created Havoc With
Hacking, U.S. Says. The New York Times. Retrieved from
http://www.nytimes.com/2013/05/03/nyregion/ex-programmer-
pleads-not-guilty-in-long-island-computer-hacking-
case.html?_r=1
Software Programmer Pleads Guilty to Hacking into Network of
Long Island High-Voltage Power Manufacturer. (2015).
Retrieved from http://www.fbi.gov/newyork/press-
releases/2015/software-programmer-pleads-guilty-to-hacking-
into-network-of-long-island-high-voltage-power-manufacturer
Spellman High Voltage Electronics Corporation. (2015).
Retrieved from http://www.spellmanhv.com/en/About.aspx

More Related Content

Similar to METHODS TO STOP DIFFERENT CYBER CRIMES .docx

LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
smile790243
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
Aswani34
 
Cyber security
 Cyber security Cyber security
Cyber security
Tanu Basoiya
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
IJARBEST JOURNAL
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
normanibarber20063
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
Mekhi Da ‘Quay Daniels
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
Rapid7
 
Cybercrime
CybercrimeCybercrime
Cybercrime
MobeenaJavid
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
elijahj01012
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Information Security Awareness Group
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
csandit
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Pixel Crayons
 
E04 05 2841
E04 05 2841E04 05 2841
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
Roshayu Mohamad
 

Similar to METHODS TO STOP DIFFERENT CYBER CRIMES .docx (20)

LandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docxLandscapingA local landscaping company that provides lawn-mowing.docx
LandscapingA local landscaping company that provides lawn-mowing.docx
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber security
 Cyber security Cyber security
Cyber security
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
Addressing Big Data Security Challenges: The Right Tools for Smart Protection...
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Risky Business
Risky BusinessRisky Business
Risky Business
 
223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 

More from andreecapon

MGMT 511Location ProblemGeorge Heller was so successful in.docx
MGMT 511Location ProblemGeorge Heller was so successful in.docxMGMT 511Location ProblemGeorge Heller was so successful in.docx
MGMT 511Location ProblemGeorge Heller was so successful in.docx
andreecapon
 
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docxMGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
andreecapon
 
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
MG345_Lead from Middle.pptLeading from the Middle Exe.docxMG345_Lead from Middle.pptLeading from the Middle Exe.docx
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
andreecapon
 
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docxMGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
andreecapon
 
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docxMGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
andreecapon
 
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
Mexico, Page 1  Running Head MEXICO’S CULTURAL, ECONOMI.docxMexico, Page 1  Running Head MEXICO’S CULTURAL, ECONOMI.docx
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
andreecapon
 
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docxMGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
andreecapon
 
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docxMETROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
andreecapon
 
Methods of Moral Decision Making REL 330 Christian Moralit.docx
Methods of Moral Decision Making       REL 330 Christian Moralit.docxMethods of Moral Decision Making       REL 330 Christian Moralit.docx
Methods of Moral Decision Making REL 330 Christian Moralit.docx
andreecapon
 
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docxMEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
andreecapon
 
Mexico The Third War Security Weekly Wednesday, February 18.docx
Mexico The Third War Security Weekly Wednesday, February 18.docxMexico The Third War Security Weekly Wednesday, February 18.docx
Mexico The Third War Security Weekly Wednesday, February 18.docx
andreecapon
 
Mercy College .docx
Mercy College                                                   .docxMercy College                                                   .docx
Mercy College .docx
andreecapon
 
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docxMerger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
andreecapon
 
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docxMGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
andreecapon
 
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docxMGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
andreecapon
 
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docxMETA-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
andreecapon
 
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docxMenu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
andreecapon
 
MGMT 673 Problem Set 51. For each of the following economic cond.docx
MGMT 673 Problem Set 51. For each of the following economic cond.docxMGMT 673 Problem Set 51. For each of the following economic cond.docx
MGMT 673 Problem Set 51. For each of the following economic cond.docx
andreecapon
 
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
Mental Illness Stigma and the Fundamental Components ofSuppo.docxMental Illness Stigma and the Fundamental Components ofSuppo.docx
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
andreecapon
 
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docxMerck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
andreecapon
 

More from andreecapon (20)

MGMT 511Location ProblemGeorge Heller was so successful in.docx
MGMT 511Location ProblemGeorge Heller was so successful in.docxMGMT 511Location ProblemGeorge Heller was so successful in.docx
MGMT 511Location ProblemGeorge Heller was so successful in.docx
 
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docxMGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
MGMT 464From Snowboarders to Lawnmowers Case Study Case An.docx
 
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
MG345_Lead from Middle.pptLeading from the Middle Exe.docxMG345_Lead from Middle.pptLeading from the Middle Exe.docx
MG345_Lead from Middle.pptLeading from the Middle Exe.docx
 
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docxMGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
MGMT 345Phase 2 IPBusiness MemoToWarehouse ManagerFrom[You.docx
 
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docxMGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
MGMT 3720 – Organizational BehaviorEXAM 3(CH. 9, 10, 11, & 12).docx
 
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
Mexico, Page 1  Running Head MEXICO’S CULTURAL, ECONOMI.docxMexico, Page 1  Running Head MEXICO’S CULTURAL, ECONOMI.docx
Mexico, Page 1 Running Head MEXICO’S CULTURAL, ECONOMI.docx
 
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docxMGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
MGM316-1401B-01Quesadra D. GoodrumClass Discussion Phase2.docx
 
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docxMETROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
METROPOLITAN PLANNING ANDENVIRONMENTAL ISSUESn May 2008, the N.docx
 
Methods of Moral Decision Making REL 330 Christian Moralit.docx
Methods of Moral Decision Making       REL 330 Christian Moralit.docxMethods of Moral Decision Making       REL 330 Christian Moralit.docx
Methods of Moral Decision Making REL 330 Christian Moralit.docx
 
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docxMEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
MEPS_Inpatient Stay database.csduidpiddupersidevntidxeventrnerhevi.docx
 
Mexico The Third War Security Weekly Wednesday, February 18.docx
Mexico The Third War Security Weekly Wednesday, February 18.docxMexico The Third War Security Weekly Wednesday, February 18.docx
Mexico The Third War Security Weekly Wednesday, February 18.docx
 
Mercy College .docx
Mercy College                                                   .docxMercy College                                                   .docx
Mercy College .docx
 
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docxMerger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
Merger AnalysisMerger Analysis Case Study© 2007 South UniversityFr.docx
 
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docxMGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
MGMT 301 EOY Group” Case Study and Power Point Presentation G.docx
 
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docxMGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
MGMT 464New Manager’s Case Study Case Analysis Worksheet #.docx
 
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docxMETA-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
META-INFMANIFEST.MFManifest-Version 1.0.classpath.docx
 
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docxMenu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
Menu Management Options· · APRN504 - 5886 - HEALTH POLICY .docx
 
MGMT 673 Problem Set 51. For each of the following economic cond.docx
MGMT 673 Problem Set 51. For each of the following economic cond.docxMGMT 673 Problem Set 51. For each of the following economic cond.docx
MGMT 673 Problem Set 51. For each of the following economic cond.docx
 
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
Mental Illness Stigma and the Fundamental Components ofSuppo.docxMental Illness Stigma and the Fundamental Components ofSuppo.docx
Mental Illness Stigma and the Fundamental Components ofSuppo.docx
 
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docxMerck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
Merck & Co. Inc. MRKCopy and pasteany three Notes to the Fina.docx
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 

METHODS TO STOP DIFFERENT CYBER CRIMES .docx

  • 1. METHODS TO STOP DIFFERENT CYBER CRIMES 1 Methods to Stop Different Cyber Crimes People must be well-informed regarding internet scams and certain vulnerabilities, which permit them to occur sooner or later. With education, they will be in a situation to help in prevention of such scams successfully (Hynson, 2012). It is imperative for people to be familiar with attempts of cybercrimes and to comprehend correct solutions in internet practices and solutions. People will learn with education how to put into practice proper security protocols. When they develop into social media savvy people and when they learn how to safe guard their computer devices, cybercriminals will encounter multiple layers of security, which will limit their illegal activities substantially. Firewalls have the capability to protect users and their network devices against cyber criminals in the first instance of a attempted breach (Lehto,2013). A firewall monitors the interchange between a local network or the internet and a user’s computer. The firewall should be enabled through the security software or a router. Cybercriminals will be unable to use the interchange traffic to install malware, which is intended to compromise the user’s network and computer. If more people would use firewalls, hackers would be at a chief disadvantage due to being unable to navigate deeper into a system to obtain sensitive information and eventually, cybercrime would be lessened for a time. Users need to analyze their operating and online systems continually so they can resolve vulnerabilities (Hynson, 2012). Internal accounting information or protocols, which lead to financial information or bank statements, should be checked on a regular basis in order to recognize the risks and mitigate them accordingly. It is very difficult for people to curb the flow of
  • 2. cybercrimes if they are ignorant of the risks in which they face or the weaknesses, which exist within their systems. One successful way of slowing the actions of cyber criminals is by acting like them. This requires law enforcement agencies such as the Federal Bureau of Investigation (FBI) to assign special undercover agents to gain access to clubs or groups of cyber criminals so they can investigate their steps (Hynson, 2012). The investigation method will become more effective by identifying the source of the problem and in developing a stronger strategy to cripple the efforts of the criminals. Cyber criminals can hack into systems without difficulty when they encounter uncomplicated passwords. Users should use passwords with at least 10 or more characters so they can amplify the complexity of logging into the computer system (Lehto, 2013). It also helps top add in capital letters and special characters to increase the complexity of a password. In addition, different accounts should have dissimilar ID’s or password combinations to avoid giving hackers access to all of your accounts. The complex passwords should also be changed on a regular basis so criminals cannot find any type of consistency in information. Cross-domain solutions involve different organizations and law enforcement agencies, which have a combined system ensuring all cyber activities, are monitored continually (Hynson, 2012). The verification of automatic and manual access or transfer of information is authenticated through the hardware and software of the system for different levels of security classification. Accessing a variety of domains will be very complicated for cyber criminals while users can get hold of the information they require with no trouble. References Hynson, C. (2012). Cybercrime. Mankato, Minn: Smart Apple Media. Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies. International
  • 3. Journal of Cyber Warfare and Terrorism (ijcwt), 3(3), 1-18. VENGEFUL EMPLOYEE2 VENGEFUL EMPLOYEE5 Vengeful Employee John Stahlschmidt Grantham University Running head: VENGEFUL EMPLOYEE 1 Vengeful Employee Michael Menese a 43-year-old computer programmer used to reside in Smithtown, Long Island, who was employed with Spellman high voltage electronic corporation. Spellman founded in 1947 a company who is a provider of direct current and precision high voltage power supplies for the medical, industrial, and scientific communities ("About Us," 2015, p. 1). Menese worked for this company from May 2008 until January 2015. He left the company after being passed over for promotion multiple times and became upset with the company (Secret, 2013, p. 1). His specialty working for the company was in software programming and systems manager specializing in developing and customizing software, which the company used to run its day to day business operations ("Long Island
  • 4. Software Programmer Arrested for Hacking into Network of High-Voltage Power Manufacturer," 2013, p. 1). He was one of two employees who primarily were responsible for the company’s software running, production planning, purchasing, and inventory control, giving him a high access level to the company’s computer network. After giving his two-week notice Menese, decided to start a vengeance campaign against the company. Before his access was removed he installed a program to capture employee’s user login and passwords. Using this information and the security credential of at least one former co-worker, he would remotely connect into the company’s network by using a virtual private network (VPN) from his home and a hotel near his new employer’s location. Soon employees at the company noticed things were happening with the computer system, which they felt were out of the ordinary. They were unable to process routine transactions, receiving error messages instead. Menese bent on revenge against his former company, exploited his access and technical knowledge to wage a sabotage campaign against his former company. He altered the business calendar by a month, disrupting production and finance operations. Due to this the company suffered over 90,000 dollars in losses because of Menese’s intrusions into the system. He also accessed the email from his former supervisor and would use a separate email account to send messages to potential candidates for his job not to accept any job offers from the company (Pickard, 2015, p. 1). The Company logged a complaint alleging, the defendant engaged in a 21st Century campaign of cyber-vandalism and high-tech revenge, hacking into the computer network of the company Mr. Menese’s former employer to disrupt its operations, thereby causing tens of thousands of dollars in damage. United States Attorney Lynch stated “We will hold accountable any individual who victimizes others by exploiting computer network vulnerabilities ("Long Island Software Programmer Arrested for Hacking into Network of High-
  • 5. Voltage Power Manufacturer," 2013, p. 1).” Menese was caught 2 May 2013 by investigators who traced the email account to warn off potential candidates for his old job. One place it was traced to was an Internet protocol address, which belonged to Menese new employer. They traced the calendar changes to a hotel in North Carolina, which happened to be a very short distance away from Mr. Menese new job. Checking the hotel records the investigators found Menese to be staying in the hotel at the time of the cyber attacks. At the time he was caught, Menese pleaded not guilty. On 6 March 2015 in the federal courthouse in New York, Michael Menese pleaded guilty to hacking into his former company’s computer network. The items brought before the court in which Mr. Menese did where: The defendant deleted a line of code in a software program that the victim company used to calculate work order costs, leading the company to incorrectly calculate these costs, The defendant remotely accessed the victim company’s network, read an e-mail sent by his former supervisor to one of his former colleagues about a candidate for the defendant’s former position, created the e-mail address [email protected],” and sent the candidate a message that stated, “Don’t accept any position from [the victim company],” the defendant gained unauthorized access to the victim company’s network and modified a database so it would appear to be March 2012 rather than February 2012. As a result, the company was unable to process routine transactions, and the defendant remotely accessed the victim company’s network and manually purged a purchase order table, which prevented the company from converting purchase requisitions to purchase orders ("FBI," 2015, p. 1) With the guilty plea Mr. Menese will be charged on 7 July 2015. Mr. Menese will be facing up to 10 years in a federal prison, as well as a restitution and fine of up to 250,000 dollars. This shows the federal government is steadfast to vigorous enforcement of the laws, which govern computer intrusion.
  • 6. References Federal Bureau of Investigation. (2013). Retrieved from http://www.fbi.gov/newyork/press-releases/2013/long-island- software-programmer-arrested-for-hacking-into-network-of- high-voltage-power-manufacturer Pickard, G. (2015). Hacker Pleads Guilty in Digital Retaliation Campaign. Retrieved from http://www.topsecretwriters.com/2015/03/hacker-pleads-guilty- in-digital-retaliation-campaign/ Secret, M. (2013, May 2). Ex-Worker Created Havoc With Hacking, U.S. Says. The New York Times. Retrieved from http://www.nytimes.com/2013/05/03/nyregion/ex-programmer- pleads-not-guilty-in-long-island-computer-hacking- case.html?_r=1 Software Programmer Pleads Guilty to Hacking into Network of Long Island High-Voltage Power Manufacturer. (2015). Retrieved from http://www.fbi.gov/newyork/press- releases/2015/software-programmer-pleads-guilty-to-hacking- into-network-of-long-island-high-voltage-power-manufacturer Spellman High Voltage Electronics Corporation. (2015). Retrieved from http://www.spellmanhv.com/en/About.aspx