Discuss about - where cybercrime goes to hide

Assignment Help Management Information Sys
Reference no: EM132136657

Please respond to student 150-250 words ...do you agree or disagree

One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Internet: Where Cybercrime goes to Hide".

These hosting providers know that there is illegal activities uploaded and distributed through their networks, but do nothing to stop it.

These providers do not comply with national or international laws and the hosting sites are maintained in countries with fewer regulations. With the cloud becoming such a huge part of the hosting market, now a lot of these organizations have more resources to keep their sites live. Law enforcement has a difficult time prosecuting these cases because of different jurisdictions, laws, and other issues.

Bullet proof hosting is very profitable for these organizations, and they prefer to pretend that they don't know what's being hosted (The Most Dangerous Town on the Internet: Where Cybercrime Goes to Hide, 2017). For these hosting organizations, the issue is that they want total control and their customers to have total control.

The problem is that by doing this, they are supporting some very bad organizations and it enables for cyber crime to continue to exist. By eliminating these hosting services, it will not solve the problem, but at least it helps to cripple their reach and forces these organizations to work harder.

The most dangerous town on the internet: Where cybercrime goes to hide [Video file]. (2016).

Reference no: EM132136657

Questions Cloud

What internal policy changes or new policies do you feel : What internal policy changes or new policies do you feel will need to be implemented to more effectively address the issue? Be sure to justify your response.
Discuss both pros and cons to getting type of testing done : Based on the information provided to you in the resources for this week, discuss both pros and cons to getting this type of testing done.
Categories of cyber terrorism and information warfare : Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address.
Social media and personal identity : Social Media and Personal Identity. Reflect on any aspect of this theory you find interesting or relevant to your relationships.
Discuss about - where cybercrime goes to hide : The idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Internet: Where Cybercrime goes to Hide".
Formulate your promotional strategy : Formulate your promotional strategy. How will you make your channel known?
Explain what the client can expect from your services : Graphically depict and effectively promote your company's structured development and services using Visio or its open source alternative software.
Analyze wireless applications and the degree of support : Analyze wireless applications and the degree of support and adoption of wireless devices for each industry.
What part of the video caught your attention most : Describe the topic of the video. What geographic content did it cover? What part of the video caught your attention most? Why?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Find the required rate of return2if rf 6 percent b 13 and

find the required rate of return2.if rf 6 percent b 1.3 and the erp 6.5 percent compute ke the required rate of

  Research different events or shift in our health care system

Select a current event or shift in the health care system from your research that has occurred within the past three to five years.

  How will companies like aol survive

Dail-up Technology and Is dial-up a dying technology? If so, how will companies like AOL survive?

  How does a syn attack deny service

If you use a packet driver, Wireshark can both capture packets and read trace files of packets that have already been captured. However, the packet driver must access parts of your operating system that some students may not have access to. That i..

  The recent threat to the security of an e-commerce operation

Research a solution to address the recent threat to the security of an e-commerce operation that you defined in Research Project.

  What are the five steps required for the it assurance

IT4683 : In awarding the promotion, the CIO specifically mentioned that you were a key player in bring about outstanding user experience for the call center.

  Which type of system would you use to change a production

Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas infor..

  Impact of workplace diversity on supervisory communications

What is the impact of workplace diversity on supervisory communications and What is the relationship between negligence and malpractice

  Should business move to the cloud

Should business move to the Cloud? Describe Zynga's approach. Compare to InterContinental Hotels. What about outages? Recommend how to select a provider

  Explain the purpose of a university security policy

Explain the purpose of a university security policy and indicate the major reasons why they are necessary. Provide your opinion as to whether a university security policy is more or less important to have than a business security policy

  What potential harm can result

Why is the selection of culturally neutral assessment tools so critical to the ethical practice of psychology?

  Why is business process modeling important

Why is business process modeling important? How do you create use cases? How do you create use-case diagrams? Explain the following terms. Use layperson's language, as though you were describing them to a user: actor; use case; system boundary; re..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd