StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Tracking the Cybercrime Trail - Case Study Example

Cite this document
Summary
The rate at which people and organization are using computers has increased highly. There are risks involved in using computers and these risks have also been on the rise. Cybercrime is one security risk that has been…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.9% of users find it useful
Tracking the Cybercrime Trail
Read Text Preview

Extract of sample "Tracking the Cybercrime Trail"

The paper "Tracking the Cybercrime Trail by Bryan Sartin" is a good example of an article on law. Technology is changing every day as a result of innovation. The rate at which people and organization are using computers has increased highly. There are risks involved in using computers and these risks have also been on the rise. Cybercrime is one security risk that has been discovered. This fraud occurs as a result of increased usage of computers and internet. In this assignment will tackle a number of questions with regard to an article by Sartin, Bryan about Tracking the Cybercrime Trail: In Addition to Knowing How to Follow the Bits of Evidence, Forensic Detectives Must Know How to Work with Law Enforcement.

  Problem was identified and steps are taken to solve the problem According to Sartin (2004), the number of fraud was discovered to be on the increase by credit card associations and issuers. The fraud is said to have been taking place for over three to four months stretch. Sartin states that by the look, the types and patterns of the cybercrime originated from one source. The main source was identified to be a company that sells electronic payment software to various retail outlets such as internet companies, retail stores, and restaurants.

No law enforcement was made since sufficient evidence was not there. The credit card issuers and associations came together decided to launch an investigation for cybercrime since there was difficult to enforce the law against the alleged company for cybercrime. The forensic investigations were to be carried out by Ubizen and began by contacting the alleged company to informing the company about the investigation regarding security breach within their production network environment. Urizen also sorts for Maximum Corporation and the company was ready to cooperate though it said it was not aware of the security breach.

Stages of Investigation In every forensic investigation, there has to be a forensic report. This report has methodologies or stages and it has to be a good one because if it’s a poor one the results are rendered to be null. The stages include: a) Problem definition The main problem here was identified to be cybercrime a form of a security breach. The main strategy after defining the problem was to get the source of the crime. In starting an article, the investigators made a discovery process before going to the site to gather evidence.

This was done to identify the problem and its source. b) Gathering data The main goal of every forensic investigation is to gather evidence. Therefore, raw data has to be gathered before a conclusion is made. Here, the main strategy used by the investigator was by contacting the company alerting them about the security breach. They also informed the company that they would send independent investigators to collect evidence. c) Evaluating and Analyzing the report When the raw data is collected it is analyzed and evaluated to ensure that it is in line with the goal of the forensic investigation.

The analyzed data is usually referred to as findings which should have supportive details. According to Sartin, the investigators found out that the fraud was as a result of duplicated credit cards. The credit card duplicates are usually unauthorized and criminals use them in purchasing products using falsified information. d) Conclusion The analysis was made after the investigations for the company and the report concluded that there was insufficient evidence were collected regarding the security breach.

Therefore, no law would be enforced to the alleged company against cybercrime. Identifying and catching Criminals Apart from identifying and catching the criminal, the investigations also wanted to discover how the crime was being committed. In Sartin's article, the investigator's in-depth analyses indicate that the crime resulted from duplicated credit cards. The in-depth analysis also shows that for a credit card to be duplicated, one would require account information contained in the magnetic stripe at the back of the credit card.

There another ultimate goal of the crime was to alert the credit card issuers and association on how such crimes occur. Such awareness helps them to increase their security system with regard to credit cards. They also alert credit cardholders of such crimes so that such crimes are minimal in the future. Type(s) of Cybercrime There are about ten types of cybercrimes but the one that suits the type of crime discussed in Sartin's article is the credit card crime. For such a crime to happen, one simply the credit card number into the website page of the vendor for only online transactions.

In Sartin's article, it was discovered that credit cards were being duplicated. In cases where the electronic card is insecure hackers misuse the card by impersonating the owner of the credit card.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Tracking the Cybercrime Trail Case Study Example | Topics and Well Written Essays - 750 words, n.d.)
Tracking the Cybercrime Trail Case Study Example | Topics and Well Written Essays - 750 words. https://studentshare.org/law/1787808-criminology-case-study
(Tracking the Cybercrime Trail Case Study Example | Topics and Well Written Essays - 750 Words)
Tracking the Cybercrime Trail Case Study Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/law/1787808-criminology-case-study.
“Tracking the Cybercrime Trail Case Study Example | Topics and Well Written Essays - 750 Words”. https://studentshare.org/law/1787808-criminology-case-study.
  • Cited: 1 times

CHECK THESE SAMPLES OF Tracking the Cybercrime Trail

Cybercrime as a Serious Problem

The author states that cybercrime will be a serious problem in the future as more of our lives are lived on the Internet.... Part of the problem in today's world is that many people put a great deal of their personal information on the Internet without thinking that it can be accessible to anyone....
1 Pages (250 words) Essay

Cybercrimes for IT Professionals

However, there are… Furthermore, aside from businesses, different trial courts are also in the peak of maximizing the use of technology in order to have an efficient way to protect the rights of the people cybercrime for IT professionals Computers and internet connections are in the finest usage to send and receive personal transactions and business dealings around the world.... rg/papers/McConnell-cybercrime....
1 Pages (250 words) Essay

Training Series Part 6

A cybercrime is different from a natural crime in the most basic sense, which is the fact that any sort of criminal activities happen through the medium of internet. A normal crime consists of thefts,… Money can be stolen on the internet.... This is the sort of crime which happens on the internet....
3 Pages (750 words) Assignment

Importance of communication plan in trail transport

However, trail usage is not a complex process because it does not involve the development of intrinsic program, but basic engineering and landscaping.... Importance of communication plan in trail transport The development of trails and Greenways has several benefits.... Despite the existence of various transport methods that are fully researched on, the trail system has been neglected and even not cared for because of the social perception (Ministry of Health Promotion)....
2 Pages (500 words) Essay

Everyday Cybercrime Issues

James Lyne: Everyday cybercrime -- and what you can do about itYoutube.... Denial of Service, using of U.... .... , and other remote connection infiltration into the network are few of the common and broad line methods through which the systems and hacked and their privacy is breached....
1 Pages (250 words) Essay

Advanced Rail Tracking and Safety System (AdRaTSS): Concept of Operations

Similarly, it helps in the enhancement of security in the nation as security officers respond Advanced Rail tracking and Safety System (AdRaTSS Introduction There is an increasing shift to the usage of rail transportation in most settings including US due to its effectiveness and efficiency.... Therefore, this project aims at providing details pertaining to the development of an advanced rail tracking and safety system (AdRaTSS)The rail tracking and safety systemAs noted, the US rail transport sector has been facing immense challenges despite its imperativeness economically, socially and security wise....
2 Pages (500 words) Essay

Find two Peer-Viewed Articles

IJCC determination is to lay emphasis on all features of cyber/internet crime, Controlling Cyber space, Practices of Cyber Crime, the effect of Cybercrimes in the typical world, ,Cyber-terrorism, Cyber Victims, the existing global viewpoints of Cyber Crime, development of cyber safety strategies, invasion of investigations, Cyber offender conducts, security of information that is online among other aspects of cybercrime.... B: The question is in the two articles is the rise of cybercrime in the developed countriesReferenceshttp://www....
1 Pages (250 words) Essay

Pros and Cons Social Networking Sites Affect on Relationships and Health

This paper "Pros and Cons Social Networking Sites Affect on Relationships and Health" focuses on the fact that technologies of the current era not only facilitate us; but also change our lifestyle.... The changes are not always likeable; however, they make life easy and enhance living style.... nbsp;  … The internet has become an essential part of modern age society....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us