Discuss what can be done to apprehend/prevent computer-related crime

What will be an ideal response?


The answer should include the following points:
? Improve international guidelines for cyberactivity
? Improve interjurisdictional communication
? Reduce anonymity
? Place controls on the utilization of encryption and steganography
? Make encryption keys discoverable under court order
? Provide law enforcement agencies adequate resources to identify the presence of online criminal activity
? Deal with lack of physicality and volatility of digital evidence

Computer Science & Information Technology

You might also like to view...

The code that will swap the first two elements of an array called friends is:

a) friends[0] = friends[1]; friends[1] = friends[0]; b) temp = friends[1]; friends[2] = friends[1]; friends[1] = temp; c) temp = friends[0]; friends[1] = friends[0]; friends[0] = temp; d) temp = friends[0]; friends[0] = friends[1]; friends[1] = temp;

Computer Science & Information Technology

Which of the following commands can be used to safely turn off a Linux host?

A. shutdown B. exit C. reboot D. sleep

Computer Science & Information Technology

What utility can be used to intercept detailed information from a company's Web site?

A. JavaAttack B. Zed Attack Proxy C. Trace D. WebAnalysis

Computer Science & Information Technology

Thermal paste is used between the CPU and heatsink to:

A. make the heatsink easier to remove when replacing the CPU. B. aid in the transfer of energy from the CPU to the heatsink. C. act as a fire retardant should the CPU overheat. D. keep the heatsink in place on the CPU.

Computer Science & Information Technology