Monday, May 6, 2019

E-crime against Stilianos Assignment Example | Topics and Well Written Essays - 2500 words

E-crime against Stilianos - appellative ExampleThis study looks into electronic crime, a new phase of technological mishap that to a man-sized extent thwarts the effort of achieving secured information administration and network establishment travel rapidly. Electronic crime or e-crime essenti everyy refers to a situation whereby crime is move by the use of technology. In most cases, these crimes are committed by against information systems and other technologically enhanced systems. Typical examples can be given as the invasion of a persons bank details by the use of technology or breaking into the infobase system of a university by the use of technology. It is in this direction that Crime Wales notes that e-Crime generally refers to a criminal activity where a figurer or computer network is the source, tool, target, or place of a crime. Crime Wales therefore concerns a deliberate attempt to absorb or harm a computer system. This is very common today because of the general growth and use of technology and technology tools. It can be observed that modern growth in technology use has resulted in a situation whereby all major global institutions are hooked unto a network in one form or the other. Very common among these network systems are the use of the systems to create electronic commerce and protection of data from public domain. E-crime is a major form of cyber threat that has resulted in a lot of advocacy programs to trash the situation. The e-crime Bureau therefore notes that The development of appropriate legislations and policies across corporate and government departments is an integral aspect of mitigating the cyber threat. ... It will be noted that Linux is a multitasking, multiuser operating system, which means that many a(prenominal) people can run many different applications on one computer at the same time (Grove, 1998). By this, there is a very high change of taking advantage of the multiplex nature of the accessibility core of the Lin ux. only indeed, the mere fact that Linux allows for multiuser system does not permit just any person to break into the system of other people. From the case study, it can be noticed that there is a particular hub that has been invaded by whoever is stinker the plot. There confirmation that there was a specific target on one of the hubs is the fact that when nmap see of the singular system was done using the IT technicians laptop, there were conflicting output listings as against the running of the lsof program to list the open transport layer network file descriptors on the same suspect system. Basically, Linux operates with a compositors case. A shell has been explained as a program that takes the commands you type and translates them into instructions to the operating system (Grove, 1998). In the persons effort to invade Stilianos system without Stilianos notice, it is very much likely that the shell was the first system component to be tampered with. It is for this reason t hat according to the case study, two listening function on TCP ports 3457 and 32411 did not show up when viewed from within the system. b) Answers to the following questions When and how Stilianos machine was initially compromised? The recitation has already been given that the shell might have been tempered with as the first move to invade Stilianos system. As far as the shell of the Linux system

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.