A 1 explains the difficulty in prosecuting computer crime .why is law seemingly
ID: 3561800 • Letter: A
Question
A
1 explains the difficulty in prosecuting computer crime .why is law seemingly a few steps behind new technology or new paradigms? For example, crimes such as a denial of service, ransomware, identify theft that occur or are initiated from different countries who have different law systems. How or can these malicious attacks be prosecuted?
2.what is the purpose of information assurance ?how does information assurance and compliancy work with another ?
3.furthermore,what is HIPAA and PCI DSS? Finally, what is the purpose of computer forensics?
Explanation / Answer
Please rate and comment if you need more help
1) explains the difficulty in prosecuting computer crime .why is law seemingly a few steps behind new technology or new paradigms? For example, crimes such as a denial of service, ransomware, identify theft that occur or are initiated from different countries who have different law systems. How or can these malicious attacks be prosecuted?
Answer:
Traditional criminal concepts of theft, trespass, and destruction of property do not fit well into the realm of cyberspace. As a result, both the federal government and virtually every state legislature have passed specialized computer crime statutes to deal with the problem of unauthorized use, access or manipulation of computers or computerized data. These statutes frequently become obsolete as soon as they are passed, with changes in both technology and behavior outpacing changes in the law. Computer viruses, or other forms of "malicious code" are not expressly prohibited under many such statutes, and the authors of such programs may successfully escape criminal prosecution.
As computer technology alters the way we conduct business and interact with each other, it changes the way crimes can be committed. Computer stalking, computer terrorism, computerized threats, cyberporn, electronic espionage and electronic extortion are all made possible by the advent of computers and high speed data networks. Legislation and regulation inevitably fail to keep pace with the imagination of motivated hackers. Hacking for fun is also being supplanted by hacking for profits as freelancers, businesses, governments and intelligence agencies turn to computer networks to facilitate both legitimate and criminal activities.
2) what is the purpose of information assurance ?how does information assurance and compliancy work with another ?
Answer:
n general, Information Assurance is the management of risk when referring to the processing, storage and transmission of information or data. It is also includes the systems and devices that process that data, and includes governance, privacy, regulatory compliance, disaster recovery and business continuity when discussing information systems. Information Assurance provides the risk management framework that defines how risks and threats should be accepted, mitigated, or transferred.
Another role Information Assurance plays is analysis and management of all software that lives on systems within its organization. IA will provide a risk assessment of the software, and based on the level of need or benefit that the software provides to the organization, they will approve or deny it for use within the network. By assessing all software prior to it being installed on an IT system, the IA group has a complete understanding and knowledge of its organization risk when confronted with potential threats, e.g. a new virus affecting a particular browser version.
how does information assurance and compliancy work with another ?
When all Information Security components work together with each role understood against the next, then risk to the organization is significantly reduced. When Security Operations see alerts, indicating unapproved software on their network, they have a clear and understood reporting channel and a well-established plan for handling that type of incident. When the Information Assurance group works with the Security Intelligence group, threats can be accurately assessed and risk mitigated. For example, the feedback provided from the SI group could prompt IA to force an early update to a vulnerable version of software on their network.
Cooperative effort within Information Security combined with Security Intelligence acts as a force multiplier against even sophisticated threats targeting your network and the hosts within. All components must work together to be truly effective against a sophisticated threat, Information Assurance compliance alone does not equal security.
3.furthermore,what is HIPAA and PCI DSS? Finally, what is the purpose of computer forensics?
The Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule is the first comprehensive Federal protection for the privacy of personal health information. Research organizations and researchers may or may not be covered by the HIPAA Privacy Rule.
The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.
Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular computing device in a way that is suitable for presentation in a court of law. The goal of computer forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it.
Forensic investigators typically follow a standard set of procedures: After physically isolating the device in question to make sure it cannot be accidentally contaminated, investigators make a digital copy of the device's storage media. Once the original media has been copied, it is locked in a safe or other secure facility to maintain its pristine condition. All investigation is done on the digital copy.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.