Week 5 Discussion: Cyber Crime, Firewalls, Encryption & Terrorism

Verified

Added on  2023/05/30

|6
|843
|323
Discussion Board Post
AI Summary
This document features discussions on cyber crime topics, specifically comparing firewall and encryption protection for securing digital information, and analyzing the forecasts related to digital crime and digital terrorism. The first discussion argues that firewall protection is more vital due to its ability to automatically detect and filter traffic, preventing unauthorized access. The second discussion identifies key forecasts in digital crime, emphasizing the increasing use of technology for illicit activities and the challenges faced by law enforcement. The document also references scholarly articles to support the arguments presented in the discussions. Desklib offers this and other solved assignments, providing students with valuable resources for their studies.
Document Page
Running Head: INTRODUCTION TO CYBER CRIME WEEK 5 0
INTRODUCTION TO CYBER CRIME WEEK 5
(student name)
12-5-2018
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION TO CYBER CRIME WEEK 5 1
Contents
Discussion 1.....................................................................................................................................2
Firewalls versus encryption.........................................................................................................2
References........................................................................................................................................3
Discussion 2.....................................................................................................................................4
Digital Crime and Digital Terrorism...........................................................................................4
References........................................................................................................................................5
Document Page
INTRODUCTION TO CYBER CRIME WEEK 5 2
Discussion 1
Firewalls versus encryption
In order to secure the digital information, the discussion takes place if firewall protection
is better or encryption protection. Encryption protection is useful for preserving the integrity of
data, it increases the confidentiality, this protection system has a fundamental role while VPN
has to be enabled, and it is dependent on user authentication. This system basically, scramble the
information to make sure that only authorized party can access it and the unauthorized member
cannot steal it.
Whereas, the firewall is a product, which includes both hardware and software, and is
located at the edge of an organization’s network to connect to the internet. This protection
system uses various techniques like filtering and techniques that include passwords to make sure
that no unauthorized traffic is getting into the network of the customer (Keefe, White, & Dennis,
2015).
In my opinion, digital information can be secured more while using firewall protection
because it automatically detects and filter the authorized and unauthorized traffic and restricts
unauthorized traffic to get into the network. The reason being various benefits of this system is
preventing attacks on organization private network by various other networks worldwide. the
system allows the company to define a funnel, and keep unauthorized user aside. Moreover, this
protection is allowed to monitor the security of the computer and network of the company,
whenever a suspicious activity is observed, an alarm will be generated. This system is providing
monitoring and recording services using the file transfer protocol and the World Wide Web
(Touboul, 2016).
Document Page
INTRODUCTION TO CYBER CRIME WEEK 5 3
References
Keefe, R., White, R., & Dennis, G. (2015). Encryption/decryption device for secure
communications between a protected network and an unprotected network and associated
methods. U.S. Patent.
Touboul, S. (2016). System and method for providing network and computer firewall protection
with dynamic address isolation to a device. U.S. Patent.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INTRODUCTION TO CYBER CRIME WEEK 5 4
Discussion 2
Digital Crime and Digital Terrorism
Cybercrime has been increasing every day globally and are resulting in major loss of finance
and has impacted on critical company’s substructure like intellectual property matter and supply
chains. Major Cyber threat is faced by infrastructures today. Along with society and corporates,
criminals are can also be deployed to the ability to have the highest amount of benefit from
internet and information technology, even if it is unethical and illegal. Forecasting digital
terrorism and digital crime are:
1. The offenses will tend to be increased rapidly, which involves electronic storage media
and computers.
2. The largest issue observed is a representation of local law enforcement, which includes
the greatest number of victims and the highest monetary loss including theft fraud and
internet fraud.
3. Increase in virtual crimes against individuals at a very fast rate, which could result in
expansion in personal computing, networking, and social networking platforms.
4. Increased risk of malicious attacks
5. Adoption of computerization as an instrument for the conduct of the crime
6. Use of global networking as a tool for terrorist groups
7. Widening of arenas of economic espionage, information welfare, and IPR theft
8. Increased use of instruments with technology by patriots, criminal terrorists, and
anarchists (Taylor, Fritsch, & Liederbach, 2014)
The most likely to happen forecast is the fifth forecast because
Document Page
INTRODUCTION TO CYBER CRIME WEEK 5 5
1. There is no doubt that people are trying to steal the information that is copyright and
trade with the public for a lesser amount.
2. In today’s world, welfare deception is rising since the economy is not in a good position,
which tends to increase in organized crime groups
One issue that justice is facing regarding this forecast is that they are unable to search for
immigrants as they have discovered the ways through criminal instruments to sneak in
without being caught (Smith, 2018)
References
Smith, R. (2018). Crime in the digital age: Controlling telecommunications and cyberspace
illegalities. London: Routledge.
Taylor, R., Fritsch, E., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice
Hall Press.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]