Hiding Crimes in Cyberspace (Dr. Dorothy Denning)
Discuss ways criminals and terrorists use encryption.
The article, Hiding Crimes, mentions how “digital computers have changed the landscape considerably.” Provide an example of what this means.
List and discuss five (5) other technologies used for hiding evidence.
Explain how drug lords, gangsters, and other criminals use “cloned” cell phones and cell phone cards.
Automated Crime (Donn Parker)
How does the author define “Automated Crime”? How does it work?
What are the six steps involved in a fully automated crime?
Discuss the key points of the computer program “Security Administrators’ Tool for Analyzing Networks (SATAN)”. Why does the article suggest that it could be the basis or first step for developing a completely automated crime?
Discuss how the author of this article suggests that each of the previously mentioned six steps can also be identified as steps in the security process as well.
BSA/AML Technology Report, October 2009, ABA/Banking Journal, 4 pages, pages 30-36
What are “true positives” and “false positives”? Discuss how these affect your staff and their workload?
Discuss the importance of bank staff software training.
“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”