logo

Challenges and Solutions in Investigating Computer Crimes

   

Added on  2023-05-30

7 Pages774 Words390 Views
Running Head: COMPUTER CRIMES 1
Network and Security
Student’s Name
University Affiliation

2
Computer crimes are rapidly growing as information technology worldwide grows. In as
much as local enforcement and municipalities are doing all they can in investigating computer
crimes and trying to stop them, they encounter so many challenges and obstacles in their work.
According to Baryamureeba, & Tushabe, (2004), there are some reasons which give them a
challenge during investigations which are;
Lack of enough resources- Many departments which do investigations may have limited
resources like tools, new technologies, enough skills and expertise in the field of investigation.
For instance, the technology of drones can help during investigations as they are used for
surveillance and monitoring in various places or departments.
Lack of enough wide recognition of computer crimes- Computer crimes are rapidly
growing but they are not being recognized. Some people are ignoring that computer crimes exist
and are increasing at a higher rate. These people take minimal actions to deal with the problem
because they lack knowledge about the issue.
Components that local law enforcement agencies should have to improve their
investigative response (Taylor, Fritsch, & Liederbach, 2014).
Adding the number of experts- Increasing the number of experts makes work easier and
fast. These people must be competent in work, with good skills in investigations, technically
proficient and up to date with the new technology the criminals are using.
Adopting high technology- Agencies should adopt high technology like the multiagency
high technology task force which is used in California to improve their investigative response.
For example, the use of Global Positioning System (GPS) helps to track and show the location of
suspects faster or their movements.

3
Use of honey ports- This will help agencies to learn the type of tools which the attackers
are using. In this case, they can develop mechanisms which will control attacks using those tools.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Attack Case Study: The Australian Catholic University Cyber Attack
|4
|791
|279

Lonewolf Execute Summary
|4
|1786
|449

Forensics and Incident Response (Electronic emails) ABSTRACT
|26
|7956
|375

Computer Forensics: Investigation of Net Banking Fraud
|12
|2176
|188

Research on the most prominent computer forensic suite
|3
|506
|295