Preview

Cybercrime

Good Essays
Open Document
Open Document
12864 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cybercrime
Research Paper: Information Security
Technologies
by
Benjamin Tomhave
November 10, 2004
Prepared for:
Professor Dave Carothers
EMSE 218
The George Washington University
This paper or presentation is my own work. Any assistance I received in its preparation is acknowledged within the paper or presentation, in accordance with academic practice. If I used data, ideas, words, diagrams, pictures, or other information from any source, I have cited the sources fully and completely in footnotes and bibliography entries. This includes sources which I have quoted or paraphrased. Furthermore, I certify that this paper or presentation was prepared by me specifically for this class and has not been submitted, in whole or in part, to any other class in this University or elsewhere, or used for any purpose other than satisfying the requirements of this class, except that I am allowed to submit the paper or presentation to a professional publication, peer reviewed journal, or professional conference. In adding my name following the word 'Signature ', I intend that this certification will have the same authority and authenticity as a document executed with my hand-written signature.
Signature _____Benjamin L. Tomhave________________________
Benjamin L. Tomhave 12/7/2004 1Research Paper: Information Security
Technologies
by
Benjamin L. Tomhave
Abstract
The following research paper provides analysis of thirteen (13) information security technology topics, arranged in ten (10) groups, that are either commonly found or emerging within the information security industry. These topics include: Access Control
Management, Antivirus, Audit Data Reduction, Firewalls, Intrusion Detection Systems
(IDS), Intrusion Prevention Systems (IPS), Anomaly Detection Systems (ADS), Event
Correlation Systems (ECS), Network Mapping, Password Cracking, Public Key
Infrastructure, Virtual Private Network, and Vulnerability Scanning Systems. IDS, IPS,
ADS and ECS are grouped



References: Boca Raton: Auerbach, 2000. 3. Chapple, Mike. Vulnerability scanning with Nessus. Unknown: TechTarget.com, 2003, accessed 12 October 2004; available from 5. Cliff, A. Password Crackers - Ensuring the Security of Your Password. Unknown: SecurityFocus.com, 2001, accessed 12 October 2004; available from Unknown: SecurityFocus.com, 2003, accessed 12 October 2004; available from http://www.securityfocus.com/infocus/1670; Internet. 8. eBCVG IT Security. Heuristic Scanning - Where to Next?. Tel-Aviv: eBCVG, 2004, accessed 12 October 2004; available from 11. Innella, Paul. The Evolution of Intrusion Detection Systems. Unknown: SecurityFocus.com, 2001, accessed 12 October 2004; available from Benjamin L. Tomhave 12/7/2004 4812. Kanish, Bob. An Overview of Computer Viruses and Antivirus Software. Unknown: Kanish, 1996, accessed 12 October 2004; available from 13. Kay, Russell. Event Correlation. Unknown: COMPUTERWORLD, 2003, accessed 12 October 2004; available from 14. Manu. Firewall Basics. Unknown: SecurityDocs.com, 2004, accessed 06 November 2004; available from http://www.securitydocs.com/library/2413; Internet. 17. National Institute of Standards and Technology. NIST PKI Program. Washington: NIST, 2004, accessed 12 October 2004; available from http://csrc.nist.gov/pki/; Program. Washington: NIST, 2002, accessed 12 October 2004; available from http://csrc.nist.gov/rbac/rbac-impact-summary.doc; Internet. Boca Raton: Auerbach, 2000. Benjamin L. Tomhave 12/7/2004 4923. Rotchke, Ben. Access Control Systems & Methodology. New York: SecurityDocs.com, 2004, accessed 06 November 2004; available from 24. Spencer, Henry and D. Hugh Redelmeier, Opportunistic Encryption. Unknown: Freeswan.org, 2001, access 07 November 2001; available from 27. Wikipedia. Anti-virus software. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from http://en.wikipedia.org/wiki/Anti-viral_software; 28. Wikipedia. Computer virus. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from http://en.wikipedia.org/wiki/Computer_virus; Internet. 29. Wikipedia. Network Mapping. St. Petersburg: Wikipedia, 2004, accessed 12 October 2004; available from http://en.wikipedia.org/wiki/Network_Mapping; Internet. 30. Wikipedia. Password cracking. St. Petersburg: Wikipedia, 2004, accessed 12 October 2004; available from http://en.wikipedia.org/wiki/Password_cracking; Internet. 31. Wikipedia. Public key infrastructure. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from 32. Wikipedia. Virtual private network. St. Petersburg: Wikipedia, 2004, accessed 06 November 2004; available from 33. Yip Chung, Christina. Anomaly Detection in Database Systems. Davis: UC Davis Computer Security Laboratory, 1999, accessed 12 October 2004; available from

You May Also Find These Documents Helpful

  • Good Essays

    student is given the opportunity to complete work during an entire semester, the instructor of this course…

    • 2739 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    CIS 2321 Week 6 Teamwork

    • 227 Words
    • 3 Pages

    Possible uses could include the register for the course, process payments, created course schedules, Assign Instructor, Print course roster, and paying tuition. Actors could include student instructor, tutor, registrar, advisor, and the cashier.…

    • 227 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cybercriminals

    • 1700 Words
    • 7 Pages

    anti virus, anti spyware, firewalls, and spam filters are also effective ways of decreasing the risk of phishing scams associated with email.…

    • 1700 Words
    • 7 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Stewart, J. M., Tittel, E., & Chapple, M. (2013). Cissp, certified information systems security professional study guide. (5th ed. ed.). Indianapolis: Sybex.…

    • 2271 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    CYBER CRIME

    • 1670 Words
    • 7 Pages

    cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and Because of the early and widespread adoption of computers and the Internet in the United States, most of the earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by cybercrime of one sort or another.…

    • 1670 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    analysis has been a manual process that is tedious and timeintensive. Unfortunately, the number of samples that need to…

    • 8999 Words
    • 36 Pages
    Powerful Essays
  • Satisfactory Essays

    IGC2

    • 2132 Words
    • 19 Pages

    This presentation may not be lent, resold, hired out or otherwise disposed of by way of trade in any form other than that in which it is published,…

    • 2132 Words
    • 19 Pages
    Satisfactory Essays
  • Satisfactory Essays

    college syllabus

    • 1015 Words
    • 10 Pages

    At the end of the course, the students should be able to do the following:…

    • 1015 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    THE INTERNET PROJECT

    • 2052 Words
    • 9 Pages

    Antivirus software is essential protection for any business or home users that is connected to internet. This software needs to be applied not only to single personal computers but to a network as a whole. This should ensure that viruses carried by floppy or zip disks or any other removable media are stopped. Additionally, antivirus software should be able to scan incoming mail.…

    • 2052 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 134697 Words
    • 539 Pages

    Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings.…

    • 134697 Words
    • 539 Pages
    Good Essays
  • Good Essays

    cybercrime

    • 889 Words
    • 4 Pages

    Cybercrime law has been a trending topic in the social media and has made the netizens be more careful of their post. The #NonLibelousPost has been a trending topic. Netizens are using this hashtag to show that their post are non libelous.…

    • 889 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cybercrime

    • 2446 Words
    • 10 Pages

    Law enforcement agencies also faced various roadblocks when investigating cybercrime incidents. Even during emergency situations, service providers were reluctant to cooperate with law enforcement officers, citing the need to protect subscriber privacy.…

    • 2446 Words
    • 10 Pages
    Powerful Essays