Explain the details of the service

Assignment Help Business Law and Ethics
Reference no: EM133190836 , Length: 2 pages

Question: In 500 words each respond to the two posts, agreeing or disagreeing.

Post 1. Stephanie

Hello Everyone,

My name is Stephanie or Steph, I do not mind. I am working on my masters in psychology currently and should be done in December if all goes well. I am not in any Branch of service however, all of my family is military. My parents met in the Army, my oldest brother is in the Air Force, middle brother is in the National Guard and the youngest is in the Marines. I am so thankful for everyone who fights for our Country including my family. I live in Chicago and work at the hospital as a rehab tech. I do patient care, vitals and whatever is needed pretty much. This is one of the courses needed for my certificate and being that I work on computers daily and we just changed our computer system, I am always interested to learn more an see how it can help me. Besides over working myself, I have two children who take up most of my time. My oldest just turned five last weekend and my youngest is eight months old. I do over work myself so fitting in school has been a struggle but I am getting it done. I am also a single mom so showing my kids you can do whatever you set your mind to is my main goal. So, wish me luck!

One of the cases I found to be very interesting was the 2015 attack with Chase. JP Chase was targeted and stole over 83 million individuals personal information and used it to gain hundreds of millions of dollars. "The trio themselves allegedly described the incident as "one of the largest thefts of financial-related data in history"(Elsom, 2017). They sold this personal information to others and they could do as they pleased, either stealing money, making fake accounts or so on. I think individuals do not think this stuff will happen to them and they assume it is just hear say and they don't want to "waste" money trying to save there items and even if they did, it cannot protect everything. The data break for this one was done through chase, not the individuals computers. Since companies have back up and all this protections you wouldn't think this would happen but sadly it does. With software protect, I think it has to be always changing because these individuals who want to find that information are going to keep going till they get it.

- Stephanie Maness

Post 2 heather

Greetings classmates and professor, there are not many nicknames for Heather, so that is fine. I completed my undergraduate degree receiving a BS in Mathematics with a minor in Philosophy. I am now halfway through my Cybersecurity Master's program. I have no military experience, but my sister is in the Coast Guard, and that was how I learned about APUS. My current job title is Project Manager and Director of Managed Services for an AWS Partner company that focuses on Cloud solutions. My job description is that of an operations manager and a project manager, while building a managed service department, doing some business development, marketing, and internal IT work. It's a lot, but I can't not be busy, or I will start to get restless, so it works. I live in Massachusetts about 40 minutes out of Boston. I am taking this class because it is a requirement for my master's program, and I am really looking forward to the content! I hope to learn a lot more about some of the nuances of cybercrime, some of my past courses have touched on this subject but I am excited for the deeper dive. My hobbies include painting, mixed media art, yoga, hiking, and working on certifications (I think that can be a hobby ?)

I suppose I would like to add that I really care about cybersecurity, I am the person in the group getting on the case for having poor password habits and not using MFA, I'm not ashamed! I have developed and taught cybersecurity classes for my coworkers that were well received, and I intend to relate my master's thesis to cybersecurity education.

1) Online services are making the ability to commit cybercrimes easy.

Research an online service and case. Please explain the details of the service/case in the discussion board. When using online services, what can be done to stay secure?

Hill and Marion (2018) describe some of the reasons that lend to why it is so easy to commit cybercrime around online services. They note the increased use of in mobile devices and the internet in general, and how this increases risk of cyber-attack. When using the Internet for online services becomes mainstream, you end up with users who are not necessarily educated on its dangers. These people can easily be taken advantage of by an online criminal, sometimes it can be social engineering taken to its worst extreme. Take for example the case Hill and Marion (2018) recount involving a murderous pair who used the Craigslist service to trick their victims into thinking they were going for a job interview and instead killing them. Rosin (2015) provides further details on this case. She gives some history on the criminals and describes how they were able to lure their victims. He posted a job offering to work on a cattle ranch that painted an idealistic picture, according to Hill and Marion (2018), and he had some very specific criteria in his interview processes. One of his victims moved across country to take the job and his disappearance was one of the trails that led to the solving the case.

When using online services, there are a lot of ways to do so safely and improve your security. In the case of social engineering, when using the internet for services, be cautious in general. I tend to be overly paranoid about anything online, but maybe my level of cautiousness is what should be standard. With regards other types of cybercrime, like viruses and malware distribution, there are ways to harden the defense of devices that access the internet. Using antimalware software is a start, having good security habits is better, making yourself aware of current threats is best.

2) Is software piracy really a big problem? Research cases on software piracy.

An analysis completed by BSA The Software Alliance (2018) reports that more than a third of the software installed on PCs is pirated. The report further highlights why software piracy is a big problem. In addition to losses in revenue from intellectual property, pirated software often has malware in it, so when downloaded, the computer is infected.

There was a case in 2017 of a man who sold millions worth of pirated software, including Microsoft, through a piracy scheme (US Attorney's Office 2017). In 2015 there was another high profile case of pirated software ending up on legitimate websites like Amazon due to the workings of a global piracy scheme (Greenburg 2015).
a) Why do many people feel that software piracy is not a serious crime?

My feeling is that people don't feel like it is a serious crime because they don't see an immediate negative effect, they perceive an immediate positive gain. The act of using pirated software does not affect them negatively, and it saves them money.

b) What is your opinion about software piracy? What can be done to stop this type of crime?
My opinion is that software piracy is stealing. In using pirated software, one is not only harming the owner of that software, but also others who are legitimately paying for the software, and having to deal with increased costs that stem from it

I don't know if it's possible to completely stop this type of crime. Some brainstorming thoughts on that front are designing the software in a way that forces a check with the manufacturer and has license information tied into the check. Another route would be to make the punishment more severe and invest more in attributing actors to these types of crime.

Reference no: EM133190836

Questions Cloud

Assignment question on history of psychology : History and Theory of Psychology PSY 4391-Texas State University San Marcos-You will need to complete one major research paper.
What are the four stages of industrialization : POLS 1600, Harvard University, What are the four stages of industrialization, How did the fourth stage alter the nature of global politics and economics
What business law is important to initiate any business : Cannella School of Hair Design - Chicago - What Business Law is important to Initiate any business?
Identify the controversy and who is involved : Identify the controversy. Who is involved? Why are they involved? State relevant facts concerning the issue. Try to separate fact from opinion.
Explain the details of the service : American Military University - Respond to the two posts, agreeing or disagreeing - Explain the details of the service/case in the discussion board
Assignment on psychology of sexual offenders : Northcentral UniversityIn this assignment, submit the topic for your research review and reflect on how you made use of the resources listed above
Writing essay on environmental issues - water pollution : Central Washington University - Do you remember you wrote an essay which is about environmental issues (water pollution) solved by using math method
Explain how you believe these types of clients will benefit : Explain how you believe these types of clients will benefit from the interventions you chose along with any potential drawbacks you may need to overcome.
Assignment on human sexuality and gender roles : Rutgers university-Write a 2 page reflection paper that specifically reflects on how the course content and readings apply to you, personally.

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Legal environment of business caselet

The assignment in Law deals with the topic "Legal Environment of Business". A case study about Mary, a newly joined employee who is working in the USA and Europe. She faces few issues at her work place in Europe and tries to talk to her manager who s..

  Business ethics & legal issues caselet

This assignment is about the concept of Business Ethics & Legal Issues. The laws relating to these can be found in Antitrust laws. These laws are concerned with those large corporations which have a majority of market share, mergers and acquisitions.

  Questions on business law and ethics

Examples of securities that are exempted from the registration provisions of the 1933 Act and involving misstatement of material facts in a prospectus.

  Discuss the doctrine of ratification of pre-incorporation

With the aid of a decided cases, discuss the doctrine of ratification of pre-incorporation contract.

  Discuss the extent of phoenixing activity

It has been estimated that about 6,000 phoenix companies operate in Australia, costing government and the community hundreds of millions of dollars per year and impacting on individuals.

  Application of law to facts

Company Law, Application of Law to Facts and Conclusion.

  Question on business law and ethics

This assignment related to business law.

  Questions on business law

Answer all the questions under business law.

  Iidentify the issue raised by the facts

Iidentify the issue(s) raised by the facts, identify the relevant legal principles, apply the relevant legal principles to the facts, reach a conclusion.

  Evaluation of software development

Prepare a report and present an evaluation of the subsequent methodologies for software development in terms of cost, resources and time.

  Business value and ethics

Business value and ethics,  Bart agrees to put Sam's Super Bowl champion-ship autographed football in his sports store to sell for $1,500. Sam agrees to pay Bart a 15% commission for selling the ball. If Joe comes in the sports store and offers Bart ..

  Explain what is meant by income by ordinary concepts

Advise what tax consequences arise in respect of the payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd