Wednesday, May 15, 2019
Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 words
Fraud And Cyber Terrorism - Research melodic theme ExampleFraud prevention includes acts such as scheming corporate fraud policies, introducing internal scrutinise departments, implementing internal controls and whistle-blower systems. The strategic method of fraud is an efficient technique to detect and illustrate both known and unidentified frauds. When implemented proactively to identify unknown fraud, it depicts laser-like precision that allows for much more efficient investigation. (Sanjay Goel. 2010). Cyber terrorist act threat Cyber terrorism is the act of illegally accessing computers and information chiefly via the internet to create physical rail at or severe disturbance of infrastructure. Cyber terrorism could scholarly be defined as The premeditated delectation of disruptive activities, or the threat in that locationof, against computers and/or networks, with the intention to ca ingestion harm or further social, ideological, religious, semipolitical or similar obje ctives or to intimidate any person in furtherance of such objectives. Efforts of relations with cyber terrorism Agencies that deal with fraud such as Interpol and the FBI are doing a great job in competitiveness against cyber terrorism. Interpol in its part is assisting all the member countries and training their personnel to equip themselves with the current trends and forms of fighting cyber terrorism. The Council of Europe Convention on Cyber Crime, which is the first international treaty for fighting against computer crime, is the product of a 4 years work by experts from the 45 member and non-member states that include Japan, USA and Canada. The treaty has already imposed after its endorsement by Lithuania on 21st of March 2004. (Achkoski, J., & Dojchinovski, M. 2011) How to try to avoid cyber terrorism With the ever changing trends in the cyber technology sector, there are no foolproof methods to protect a system. To say that you have a completely secure system, then it mean s that it can never be accessed by any hotshot. Even in most military set up, top secret information is kept on servers with no outside connection as a form of deterrence of cyber terrorism. Another joint way that cyber terrorism can be avoided apart from such isolation is encryption. The wide spread use of encryption is repressed by most states ban on its exportation thus its intercontinental communion is left somewhat unsecured. (Kapodistria, H., & Christos D. 2011) Other internet users tend to encourage the use of firewalls to screen all communication theory to a system including e-mail messages, which whitethorn carry logic bombs. Firewall is a somewhat generic enunciate for methods of filtering admittance to a network. Firewalls tend to define the services and access that is allowed to each user. Judicial repercussions on cyber threats Since the lucre is a cooperative venture not owned by a single entity or government, there are no centralized rules or laws governing its use? The lack of geographical restrictions may transmit rise to a state of affairs where an act that may be deemed legal in one region turns out to be illegal in the other. (Jewkes, Y., & Yar, M. 2010). In general, most internet users tend to consult to the following theories under which a country may assert regulatory jurisdiction (a) A country may assert jurisdiction based on objective territoriality when an illegal activity occurs within the country. (b) A country may assert jurisdiction based on the nationality of the wrong doer. (c) A country may assert jurisdiction based on the right to defend the nations sovereignty when faced with terrorization declare as serious in the international community. Conclusion The predicament of cyber terrorism and fraud is involves many
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.