Surfers Beware! The Term cyberstalking seems to be cropping up everywhere but no one knows exactly what it means. Cyberstalking can be defined as threatening behavior or unwanted advances directed at another using the Internet and other forms of online and computer communications (The National Center for Victims of Crime, (NCVC). n.d.). Cyberstalking is an extension of the physical form of stalking but it is harder to detect the perpetrator because of the anonymity issues from electronic communications.
There are also numerous issues of when personal information is interrupted, legally or illegally. The United States Department of Justice inflates the description of cybercrime to incorporate any unlawful action that makes use of a computer for the storing of evidence. The list of cybercrimes is increasing tremendously, and it now comprises of those criminalities that have been made
The act addressed the law issue of computer crimes and focused on the criminality of using computers as tool to harm others. The field of digital forensics involves extracting data from digital devices. No one could have imagined that the field would grow so rapidly. Since the 1990s, digital devices have been transformed from plain ordinary hard drives to smart phones. Digital forensic investigations have also been transformed from using DOS based systems to extract data to today’s standards of using “clean rooms” to ensure the reliability of the data extracted.
Felecia Frazier Principles Info Sys Security July 14, 2015 DeVry University Ports Scans and Ping Sweep Ping sweep and port scans are computer activities that dishonorable people use to gain access to your private networks. It also can be useful for protecting or information because if we us port scan we can find out if someone have hacked into your system. Heinous computer activities, such as port scans and ping sweep are how some hackers get your information out your computer. A port scan is a technique for determine which port on a network is open. When running a port scan on a network it discloses which ports are open and receiving data, it also discloses the existing security devices such as firewall that are available
The knowledge gained from both degrees can be attributed to his ability to break into homes and harm and/or kill his victims. (AETN UK, 2005-2011) System forensics, now referred to as digital forensic, is the process of purposely examining computer media as well as network components, software, and memory for evidence. A Forensic Investigator looks for evidence on various types of media such as hard disks, tapes, compact disks (CDs) and other optical disks, flash drives, and other media. A Digital Forensics specialist may be able to conduct a thorough investigation using a single device or across a network or the Internet. (Vacca &
Forensic accountants should be able to analyze situations and financial statements. They should have an eye for identifying discrepancies. Forensic accountants will often need to read between the lines and think outside the box to solve problems. Forensic accountants should also have a keen eye for detail. The forensic accountant should be able to comb through hundreds of records and point out the mistake.
Suspects in murder cases routinely have their laptops and cell phones examined for corroborating evidence. Corporate litigation is also dominated by electronic discovery of incriminating material. The second class of digital forensics cases are those in which the crime was inherently one involving computer systems, such as hacking. In these instances, investigators are often hampered by the technical sophistication of the systems and the massive amount of evidence to analyze. Digital forensics is powerful because computer systems are windows into the past.
Examples of surveillances that are commonly used today incudes watching or listening to an employee, video recording, telephone monitoring, internet and computer monitoring. Computer monitoring can include the use of keystroking logging, email filters, monitoring of websites visited and content stored in computer hardrives. These forms of surveillance are major contributors to the lack of privacy that occurs in the workplace. Some may say that privacy and privacy in the work place are concepts that are difficult to define. Ethan Catch defines “privacy as the ability to control what others can come to know about you” (as cited in Hartman, 2001, p.10).
This includes hosts file poisoning, even though the hosts file is not properly part of the Domain Name System. Hosts file poisoning is discussed in the malware section since it involves changing a file on the user’s computer [14]. j) Content-Injection Phishing Describes the situation where hackers replace part of the content of a legitimate site with false content designed to mislead or misdirect the user into giving up their confidential information to the hacker. For example, hackers may insert malicious code to log user's credentials or an overlay which can secretly collect information and deliver it to the hacker's phishing server. k) Man-in-the-Middle Phishing This is harder to detect than many other forms of phishing.
Case Study For any business ping sweeps and port scans could be a huge security threat if they continue unnoticed. Ping sweeps are performed to find end points on a network. Then a port scan is performed to find an open door into that particular end point or end points. After that anyone can find all kinds of utilities on the internet to exploit these open doors on systems and gain access to important and confidential files on the network. It’s imperative that we not only protect against these types of activities on the network, but that we also conduct them ourselves.