15 Jan 2023

44

Cyber Security Assignment

Format: APA

Academic level: High School

Paper type: Coursework

Words: 1233

Pages: 3

Downloads: 0

Part 1 

Question 1 

Advancement in technology has improved the way people live by changing human behavior in various ways. Over the last twenty years, technology has changed human behavior through: 

It has created a digital wall. Technology has changed how people interface; instead of consulting each other for knowledge, they primarily rely on technology for knowledge. The internet and search engines have made it possible for people to access the information they need instead of consulting others. This has stagnated social skills, creativity, and innovation. For instance, a student would rather "google" something they do not understand rather than ask the lecturer, who would have provided a better explanation. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

People have become less safety-conscious. Technology gadgets like mobile phones have reduced the attention human beings have to safety. For example, individuals are often inclined to use their phones even while driving, which has increased the chances of accidents. 

Question 2 

A subculture is a small cultural group under a larger group, normally having beliefs that vary from the larger culture, although some beliefs may be similar. Subcultural groups have their values about culture, sex, and politics; they serve as an excellent way for people with similar interests. 

The growth of the internet has improved how communication between members of a subculture communicate. The internet has brought people in subcultures together by providing them with a platform to exchange ideas. It has made the sharing of ideas quick and accessible via social media. People with common interests can share ideas online through blogs and social media groups, which has promoted communication. For example, Facebook groups have allowed individuals to share interests and enjoy sports like football. 

Part 2 

Capital One 

In 2019, Capital One was hit by a data breach where personal information of more than 100 million individuals was stolen. The hacker accessed the server, storing clients' information through a firewall “misconfiguration” on a web application (Weise & Flitter, 2019) . This can be classified as computer fraud, as the hacker obtained the server illegally, but there is no evidence of her selling the data online. 

The FBI tracked the hacker's activity through digital footprints of online activities on Meetup, slack messaging, and twitter, which linked her to the data breach. The hacker used the name “erratic," which was linked to her online posts (Weise & Flitter, 2019) . The FBI also obtained several digital devices, which were referenced to Capital One data theft. 

This crime can be classified under the routine activity theory. It emphasizes that the offender should have the motivation and obtain a satisfactory target, which is vulnerable (Reyns, 2013) . Ms. Thompson was not interested in selling the personal information obtained nor hiding her online activities. Instead, she was motivated to the crime, Capital One was a suitable target, and had a firewall misconfiguration, which Ms. Thompson used. She used her expertise as a software engineer and former AWS worker for the data breach. 

U.S. A Military 

In 2019, U.S. military seniors and veterans' personal information was obtained illegally in the South Korea base. This information was photographed from a computer screen and then used to withdraw and reroute millions of benefits. The money was wired to the hackers' bank accounts and laundered before the money was traced, and five individuals indicted (Vigdor, 2019) . This was a case of identity theft as the criminals assumed the identity of the veterans to withdraw and reroute the cash to their accounts. 

The department of justice followed the money through the digital footprints left behind by the money trail. The offenders had found ways to launder the money to other people’s accounts using international wire remittance services. After tracing the money destination, the investigative team was able to narrow down to the offenders. 

This case fits the low self-control cybercrime theory. It stresses that individuals with less control are self-centered, lack empathy, short-sighted, risk-takers, and impulsive (Burruss, Bossler, & Holt, 2012) . In this case, the suspects in the crime never calculated the consequences of the crime and took a huge risk of stealing the information from a USA military base–this was daring! Also, the individuals showed a lack of empathy by ripping off the benefits of disabled veterans without considering how they would survive. 

First American 

In 2019, the real estate company, The First American, experienced a serious data breach that compromised around 900 million records dating back to 2003. The company's website was compromised, and any individual could publicly access any document if they had the viewing link and were able to modify the link. The main problem was the website design error referred to as the Insecure Direct Object Reference (Newman, 2019) . Accessing the information from the website made this crime an identity theft as personal identifying information was obtained and could have been sold online. 

The major problem may not have been an attack but a website design problem. The Insecure Direct Objective Reference allowed an intruder who managed to identify the viewing link to obtain clients’ personal information. The investigation team temporarily brought down the site until the issue was rectified, after which the website was put back online. 

This crime can be classified as a routine activity theory. According to this theory, an opportunity and motivation must exist for a crime to occur (Myers, 2016) . In this case, any individual who needed any information could access it through the legitimate website. Individuals obtaining the data were opportunists as the website was unprotected, and the rewards of selling the data online acted as motivation. 

Part 3 

Question 1 

For this investigation, various laws can be applied. Some of the laws include: 

Computer Fraud and Abuse Act. This act prevents individuals from unauthorized access to another computer system (Hagen, 2010)

Stored Communications Act. This act prevents individuals from unauthorized access to stored electronic communication or data. Accessing data from the motor vehicle record is a violation of this act (Justice, 2020). 

Identity Theft and Assumption Deterrence Act. This involves using information from another person for unlawful activities (FBI, 2016). 

Question 2 

The information that could be obtained by the FBI during the search includes his home and office computers, cellphones, USB drives, and information stored electronically. According to Cornell Law (2016), to obtain a search warrant, the FBI should appear to a neutral judge and present hard facts either as testimony or an affidavit; establishes a basis for issuance. In case there are grounds for issuance, the judge gives a signed warrant, which identifies the property to be seized from the search, the person, time, and place of search. 

Question 3 

After searching the property, the evidence obtained will be extracted and processed through (Norwich University, 2017): 

Identification. This involves collecting preliminary information about cybercrime. Information identified include, who, how, and when the crime occurred. 

Collection. This process involves acquiring the evidence. Information from hard drives, USB drives, cell phones, and computers is acquired and secured by controlled boot discs to obtain sensitive data, transferring and copying digital data. This process must follow legal procedures. 

Evidence examination. Involves examining the data in archives using various analysis techniques for digital data analysis, such as software. 

Documentation and reporting. Involved recording information relating to evidence obtained and recording all activities related to the investigation, such as storing data. This ensures the integrity of the data. 

Question 3 

In 2011, Aaron Swartz was prosecuted for the CFAA violation. He was prosecuted for bulk downloads of about 2.7 million study resources from JSTOR service through the MIT network. JSTOR never pursued the case. The department of justice prosecuted the case as Swartz violated stored media accessing policies with the intent of unauthorized distribution of the materials on campus. He was charged with four counts of felony, which later increased to 13 as the download dates were delineated. He was to face a 50-year sentence and a possible fine of $1 million. Swartz was presented with a pre-deal to complete a six-month sentence, but he rejected it (Zetter, 2015) . He later committed suicide. 

References 

Burruss, G. W., Bossler, A. M., & Holt, T. J. (2012). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime and Delinquency, 59 (5), 1157-1184. 

Myers, N. (2016). Review of the Roots of Youth Violence: Literature Reviews (Vol. 5). Ontario: Ministry of Children, Community, and Social Services. Retrieved from http://www.children.gov.on.ca/htdocs/English/professionals/oyap/roots/volume5/chapter03_rational_choice.aspx#:~:text=Routine%20activities%20theory%20relates%20the,offender%20will%20commit%20a%20crime. 

Newman, L. H. (2019, May 24). Hack Brief: 885 Million Sensitive Financial Records Exposed Online. Wired . Retrieved from https://www.wired.com/story/first-american-data-exposed/#:~:text=On%20Friday%2C%20independent%20security%20journalist,website%20for%20anyone%20to%20access. 

Reyns, B. W. (2013). Online routines and identity theft victimization: Further explaining routine activity theory beyond direct-control offenses. Journal of Research in Crime and Delinquency, 50 (2), 216-238. 

Search Warrant. (2016, May 25). Cornell Law School: Legal Information Institute . Retrieved from https://www.law.cornell.edu/wex/search_warrant 

Steps for Conducting Computer Forensics Investigations. (2017, September 11). Norwich University Online . Retrieved from https://online.norwich.edu/academic-programs/resources/5-steps-for-conducting-computer-forensics-investigations 

Vigdor, N. (2019, August 23). 5 Indicted in Identity Theft Scheme That Bilked Millions From Veterans. The New York Times . Retrieved from https://www.nytimes.com/2019/08/21/us/military-identity-theft-scheme.html 

Weise, K., & Flitter, E. (2019, July 29). Capital One Data Breach Compromises Data of Over 100 Million. The New York Times . Retrieved from https://www.nytimes.com/2019/07/29/business/capital-one-data-breach-hacked.html 

Zetter, K. (2015, October 26). The Most Controversial Hacking Cases of the Past Decade. Wired . Retrieved from https://www.wired.com/2015/10/cfaa-computer-fraud-abuse-act-most-controversial-computer-hacking-cases/ 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Cyber Security Assignment.
https://studybounty.com/cyber-security-assignment-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Criminal Justice

Research in Criminal Justice

Research is the primary tool for progressing knowledge in different fields criminal justice included. The results of studies are used by criminal justice learners, scholars, criminal justice professionals, and...

Words: 250

Pages: 1

Views: 166

17 Sep 2023
Criminal Justice

The Art of Taking and Writing Notes in Law Enforcement

Every individual must seek adequate measures to facilitate input for appropriate output in daily engagements. For law enforcement officers, the work description involving investigations and reporting communicates the...

Words: 282

Pages: 1

Views: 183

17 Sep 2023
Criminal Justice

Justice System Issues: The Joseph Sledge Case

The Joseph Sledge case reveals the various issues in the justice system. The ethical issues portrayed in the trial include the prosecutor's misconduct. To begin with, the prosecution was involved in suppressing...

Words: 689

Pages: 2

Views: 252

17 Sep 2023
Criminal Justice

Victim Advocacy: Date Rape

General practice of law requires that for every action complained of there must be probable cause and cogent evidence to support the claim. Lack thereof forces the court to dismiss the case or acquit the accused. It...

Words: 1247

Pages: 4

Views: 76

17 Sep 2023
Criminal Justice

New Rehabilitation and Evaluation

Introduction The rate of recidivism has been on the rise in the United States over the past two decades. Due to mass incarceration, the number of people in American prisons has been escalating. While people...

Words: 2137

Pages: 8

Views: 140

17 Sep 2023
Criminal Justice

Justification of Reflections and Recommendations

Credible understanding and application of criminal justice require adequacy of techniques in analyzing the crime scene, documenting the shooting scene, and analysis of ballistic evidence. The approaches used in...

Words: 351

Pages: 1

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration