StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Cyber Security, Cyber Crime and Cyber Forensic - Assignment Example

Cite this document
Summary
The author of this assignment "Cyber Security, Cyber Crime and Cyber Forensic" comments on the role of federal agencies in fighting digital crime. It is stated that the United States of America among other developed countries are facing escalating war against cybercrimes…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Cyber Security, Cyber Crime and Cyber Forensic
Read Text Preview

Extract of sample "Cyber Security, Cyber Crime and Cyber Forensic"

The Role of Federal Agencies in Fighting Digital CrimesQuestion 1 TheUnited States of America among other developed countries are facing escalating war against cybercrimes. The safety of the nation on digital basis entirely depends on the competence and devotion of the Federal agencies in the country. The agencies performance is not however a walk in the park since its success is barred by a number of retarding factor that include: inadequate supply of essential equipment, insufficient training facilities for its personnel and obtaining of essential resource may involve long procedure thus compromising service delivery.

Curbing digital crime can be overwhelming if the agencies involved do not acquire appropriate training for the job. This initiative is likely to be a costly one but since it is bound to ripe digital security then it is a priceless initiative worth taking (Santanam&Sethumadhavan, 2011). Moreover, trained personnel without the necessary equipment for the job are another inhibiting factor to the agencies’ efforts to eradicate digital crime. Ill equipped agencies are likely to underperform since tracking down cybercrimes is likely to be impossible.

The independent nature of these agencieslimits their access to government support. Agencies need to have certain resources; human resource and capital for smooth operation. These essential resources must be availed to the agency on time so as to avoid disrupting its operation. Therefore the independent nature of these agencies inhibits the acquisition of this vital resource thus undermining their operation (Finklea&Theohary, 2013).Question 2 The federal government agencies have the mandate to combat computer crimes.

This is a well-organized agency which possesses the necessary expertise and efficient technology to combat digital crimes at the national level. The federal agency has thus created special sections within this organization so as to aid in combating this type of crime, this sections include: The secret service – this division has been created by the agency to fight computer crimes. It has been mandated to enforce the following responsibilities in relation to computer crime: (1) the section is mandated to identify frauds in financial institutions. (2) Investigation of digitals crimes that concern the federal interest.

The department of justice – this department is chaired by the attorney general who is charged with the mandate to represent the state in matters that desire a legal approach. He also offers advisory services to the president. This department is responsible for offering a prudent response to threats posed on the United Statesby digital crimes and terrorism (Finklea&Theohary, 2013). Federal bureau of investigation – this section investigates criminal activities that are related to digital crime or terrorism managed domestically such as hacking of systems, transmission of illegal material online and internet frauds.

National Security Agency – this section of the organization is charged with the mandate to protect United States’ information system from unauthorized access. This is achieved through designing of coding systems that are computerized so as to preserve the integrity of the state’s information system. Federal Trade Commission – this section is responsible for monitoring traditional criminal activities which occur online, for instance false marketing crimes (Finklea&Theohary, 2013). In conclusion, the realization by the federal government that collaboration among private agencies, federal agencies, state and local agencies to combat digital crime is necessary has successfully guaranteed reduced digital crime rate in the United States despite the fact that this type of crime is not limited to boundaries.

Loop holes in information protection results in diverse kind of crimes, ranging from defense to finance.ReferencesSantanam, R., &Sethumadhavan, M. (2011).Cyber Security, Cyber Crime and Cyber Forensic: Applications and Perspectives. Idea Group Inc. PrintFinklea, K. M., &Theohary, C. A. (2013).Cybercrime: Conceptual Issues for Congress and U. S. Law Enforcement.Congressional Research Service.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Security, Cyber Crime and Cyber Forensic Assignment”, n.d.)
Retrieved from https://studentshare.org/information-technology/1630329-the-role-of-federal-agencies-in-fighting-digital-crime
(Cyber Security, Cyber Crime and Cyber Forensic Assignment)
https://studentshare.org/information-technology/1630329-the-role-of-federal-agencies-in-fighting-digital-crime.
“Cyber Security, Cyber Crime and Cyber Forensic Assignment”, n.d. https://studentshare.org/information-technology/1630329-the-role-of-federal-agencies-in-fighting-digital-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Security, Cyber Crime and Cyber Forensic

Forrensic computing - securing evidence

Whenever there is cause for computers to be confiscated for forensic examination, there are some pointers as regards the ACPO (Association of Chief Police Officers) Guide for Good Practice concerning digital and electronic evidence.... It is also good practice to treat electronic data in the same manner as physical or traditional forensic evidence, and the ACPO guidelines are aimed at achieving the required standards....
4 Pages (1000 words) Essay

Malware and Their Current Impact on Private and Public Affairs

The paper "Malware and Their Current Impact on Private and Public Affairs" discusses that in order to reduce the risks attached to malware diffusion, it is important to raise the level of awareness for such malware, mostly for sectors which are involved in mobile communications and social networking....
8 Pages (2000 words) Coursework

Human Factors and the Insider Threat

In order to maintain the cyber security of people under their fundamental right to be secure, it is necessary to assess the human aspects and challenges of cyber… Cyberspace increases our social interactions, social performances, improves business models, and all in all it makes our personal lives better and interactive through communicating anywhere in the world. But on the other hand, there is a range of security problems that may The cyber security is a framework which enables the users to protect their cyber assets through preventing, detecting, countering and recovering the cyber incidents (Mehan, 2008)....
5 Pages (1250 words) Research Paper

Messaging Apps Accusation Via Wireless Connection

Cyber attacks can involve a large number of hosts; requiring intelligent forensic analysts to reveal the evidence and to link this evidence together (Wang, 2010).... Network forensics does not stop the network crime from happening; rather, it helps the law enforcement entity to collocate the required information....
5 Pages (1250 words) Essay

Electronic Crime in the US

cyber crime: Investigating High-Technology Computer Crime.... Although it is always difficult to detect hackers, the field of computer forensic helps in detecting this vice.... E-crime is an activity which is intentionally aimed at harming the victims directly indirectly using modern telecommunication networks.... Protection against e-crime begins with an individual at home.... Family protection can be done through securing a protected wireless network using passwords, Electronic crime Thesis ment Both the and individual people have commit felonies of e-crime daily....
1 Pages (250 words) Essay

Computer Crime Is Unlawful Activities

The best prevention for cyber crime is by installation of restrictions.... Digital Evidence and Computer Crime: forensic Science, Computers and the Internet.... Computer crime has been on rise recently… Additionally, the rise of computer crime is attributed to inexistence of laws related to computer crime (Fisch & White, 1999). Computer crime is not always associated with physical damage of property....
1 Pages (250 words) Essay

Effective Techniques to Mitigate Risks, Incorporating Voice Signatures

This is the point where digital forensic experts are incorporated for identifying the threat, impact and network incidents caused by it.... Organizations experience new techniques and methods from an ongoing investigation by a digital forensic expert.... Moreover, financial institutions are keener to adopt forensic analysis, as this domain including the business model and nature of the data, cannot compromise on security.... In the current scenario, where a network is already breached by a threat, these forensic experts focus on three core factors i....
8 Pages (2000 words) Essay

Types and Categories of Threats to IT Systems

This certification was specifically designed for information security professionals who work is to oversee the day to day running of the system.... hellip; CSSLP is the newest type of certification that ensures security is maintained throughout the software lifecycle.... It has seven domains that ensure security is highly maintained.... In such a case, security should be tightened on system access.... Storing passwords should be done in an encrypted way to ensure their security....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us