What currently is being done to combat cybercrime and to secure the Internet today?
What will be an ideal response?
There are a number of ways in which individuals and organizations are attempting to combat cybercrime. Threat or risk analysis involves a complete and thorough assessment of the perils facing an organization including the threat of high-tech crime. Once such threats are identified, strategies to combat them may be introduced.
One such strategy is at the federal level: the creation of agencies designed to investigate violations of computer-crime laws. These include the FBI's National Computer Crime Squad and the DOJ's Computer Crime and Intellectual Property Section. Another strategy involves "sniffers" designed for automated monitoring of network traffic. The development of sanctions that would be effective deterrents for high-tech offenders includes confiscation of equipment, limiting the offender's use of computers, and restricting the offender's freedom to accept jobs involving computers. It is also clear that strategies to protect the Internet from treats from hackers and computer criminals are necessary.
You might also like to view...
An investigation can help identify why risk control measures failed
Indicate whether the statement is true or false
A student reads a study that finds that female students are more likely to cheat on exams than male students. From this, he concludes that women's colleges will have high levels of cheating. This is an example of ______.
A. a nomothetic explanation B. an idiographic explanation C. reductionism D. an ecological fallacy
Comparative research can be used to evaluate whether a theory of crime developed in one society also explains crime in other societies
a. True b. False
Which of the following statistical techniques relies upon testing in the null hypothesis?
a. mean b. chi square c. range d. median