Case Study: Signed Applets

Decent Essays
3.2.3 Case Study: Signed Applets

1) What prompts normal people to take this action and exposing themselves to the malware risk?
Many times people cannot pass up the opportunity to obtain something free on the internet. In addition to that, if it’s free or looks interesting (for example the case study stated that the “Big Ad” was constructed to appear, “very big, looked very expensive and impressive.”) people will share the information.
2) What current websites have clones (name both)? You will need to Google/misspell about and find out.
I am not sure what the second website is, but I was redirected when I typed in www.faecbook.net. I also found www.twitter.net, but I don’t believe it is the second site that you are speaking of.
3) Explain
…show more content…
7) Pirating movies is a big issue today…would viruses on these pirating websites stop you from using these sites? Why?
I would stop using pirating websites because the viruses could cause so much damage to my PC. There isn’t anything on the internet that is worth creating that kind of compromise. It can be difficult to discern which sites to trust as we saw in the examples from the case study.
8) What tools would you use to determine if PC had these types of crimeware issues?
In addition to antivirus software, I would need to create filters to monitor for malware.
9) As a detective, what steps you take to help Carlton Draught regain control over the problem?
I would see if I could obtain a court order to shut down the malicious site and see what if any protocols could be put in place to regain the integrity of our legitimate site.
10) As a detective, how would investigate the crimes posed against internet users?
I would need to determine what the biggest threat to the internet user is and work my way from there. I need to find out what their vulnerabilities and how to combat those

Related Documents

  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    1. Policies: Policies like Acceptable Use, Internet Access, and Email and Communications Policies can take the risk out of the user’s hands of doing what is right. Sites that could hold malicious codes and viruses can simply be blocked from access so that it isn’t even in their “hands” to make the decision. 2. Provision Servers: Using software like IPAM, making sure that your servers all have static addresses assigned to them.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography.…

    • 1462 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Since 1998, internet crime involving the sexual exploitation has risen by more than 400%. Four. hundred. Percent! Not only that, but the there has also been a significant increase in downloading, possessing and distributing child pornography online. So much so, that it is now estimated to be a $20 billion industry worldwide.…

    • 810 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Task 3 - Impact on Information System Strategy This section discusses the impact of social networking on nonprofit-making organizations and how social networking will impact on the planning of information systems. 3.1. Impact of social networking on non-profit organizations Social networking sites such as MySpace, Friendster and Facebook have become very popular, with membership reaching more than 200 million today. The popularity of these sites can be attributed to the freedom in allowing users to create their personal profiles and interact with others by sharing content and communicating through Instant Messaging and chat.…

    • 1538 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Computer technology progressed rapidly since the 1900’s. Computers are no longer scarcely around, many people have them and use them on a daily basis. They have also become an important source of evidence in criminal activities. Computers are very helpful for homicide investigators, because they can discover whether methods on how to murder were researched on the internet, if anything suspicious can be found in emails, or if threats were made towards the victim prior to the murder. Since children can easily get on the computer to use the internet, it gives sexual predators an opportunity to seek out child victims online.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Based on information found at http://www.streetdirectory.com/travel_guide/119477/security/why_spyware_is_so_dangerous_to_you.html Spyware can be very personal to you in a way of stealing your information. Why and what it steals Among the very bad Spyware we find a thing called “malicious Phishing”. The people who make these Phishing site are usually skilled computer technicians and basically, talented people. They would much rather use their talent to hide behind fake web sites and make a mess of others.…

    • 172 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Illustrate the differences between digital forensics and network forensics. Digital forensic:  Digital forensic is a branch of forensic science and it talks about the recovery and investigation report found in the digital devices.  Digital forensics is about the "preservation, identification, extraction, documentation and interpretation of computer data"  In order to accomplish these goals, there are well-defined procedures, also derived from law enforcement, for acquiring and analyzing the evidence without damaging it and authenticating the evidence and providing a chain-of-custody that will hold up in court.  Digital forensic have variety of applications to supports a hypothesis before criminal and civil courts.…

    • 520 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Your body is smart and it sends you hazard signs about your wellbeing problems you might have. Note: Don't disregard the following 10 signs because of the fact that they can spare your life! White of the eye Your white of the eye ought to dependably be white, regardless. In the event that it is red, you should be concerned.…

    • 244 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Teslacrypt Analysis

    • 1012 Words
    • 5 Pages

    Teslacrypt (a.k.a. EccKrypt ) is a malicious program that encrypts users ' files without the knowledge or consent of the user. It falls into the sub-category of ransomware, a type of malware that encrypts the user 's files using AES encryption and forces them to pay a certain amount of money to decrypt the user 's information, essentially holding a person 's data as hostage. It first emerged around February 2015 along with its counterpart, Alphacrypt, which was released in April 2015, and it has proven capable of infecting most versions of Windows including Windows XP, Windows Vista, Windows 7 and Windows 8. It can infect multiple types of files, but among the most infected are video game files, including, but not limited…

    • 1012 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    You vs. Social Engineering Technology has come a long way since its birth. Nowadays, we have the internet, cell phones, social media, YouTube, Netflix, and many more technological innovations. However, even with all these technological innovations, keep in mind that your security is more vulnerable than ever. Security is a major issue and plays a massive role in our everyday lives. A few examples are locking your car, using your email and accessing your banks ATM.…

    • 1504 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    What is software piracy? According to Linfo, software piracy is a term that is used to describe the copying or use of computer software in violation of its license. Copying, downloading, and sharing software onto other computers are ways that software piracy occurs. Software piracy causes a big loss in revenue to the publisher or creator of the software. This causes the software to be pricier to the consumers.…

    • 764 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Toyota – Internal and External environment analysis. Internal business environment. The internal business environment is composed elements within the organization. It includes factors within that have an impact on the approach and success of your companies operations.…

    • 1423 Words
    • 6 Pages
    Great Essays
  • Great Essays

    INTRODUCTION Computer software, or simply software, also known as computer programs, is the non-tangible elements of computers. It signifies the set of programs that govern the operation of a computer system and make the hardware run. Software is commonly written in high-level programming languages that are easier and more effective for humans to use than machine language. High-level languages are compiled or created into machine language object code.…

    • 2800 Words
    • 12 Pages
    Great Essays