Write about device seizure from the producers paraben

Assignment Help Business Law and Ethics
Reference no: EM133191895

Question: Hopefully you are all doing well and will continue to do well as long as we need to be quarantined.  I know personally speaking that it has been pretty rough with the quarantine part because I am stuck at home with very little physical activity for myself and my children, pretty miserable to say the least.  This week we are focusing on mobile phone (smart phone) and PDA applications and out of six of the software tools that were given to us to choose from, I chose to write about Device Seizure from the producers Paraben.

Paraben is a producer who created the forensic too called Device Seizure, otherwise known as DS; the device that is used for all things involved with forensics is not only handheld, but powerful also as it allows the user or investigator to perform logical and physical acquisitions for data, the recovery of deleted data, and finally - entire data dumps on exactly 2400 models of mobile devices like PDA's and smartphones (Hoog, 2011, pp. 1).  The main goal of the forensic tool is to retrieve data from these mobile devices in the best way possible, which just happens to be software applications.  As an organization, Paraben is known for their incredible capability to keep up with the technology that comes forth with every jump in technological advances; this means that every time technology jumps to a newer level of sophistication, Device Seizure will still have the capabilities of acquiring multimedia files such as messages (text), images, video and audio files (Hoog, 2011, pp. 2).

1.  Passwords are the primary method used to verify the identity of users, and the security of passwords must be of utmost importance to protect not only the user but the network as well. Passwords present significant risk factors in terms of security in information systems, as they are vulnerable to attacks mainly due to user behaviors and practices, but not necessarily related to the password system itself. Therefore, the most important thing a user can do to protect an account from hacking is to create a strong password. Morris emphasizes that "authentication is one of the most critical areas in computer security, and the use of traditional text-based passwords has been well studied. However, this type of authentication mechanism has drawbacks" (742). There are several methods to add security to systems, and therefore, a secure password, depending on the computer's operating system, can use encryption programs. For example, in Linux OS we can use shadow file formats. "The shadow password format stores account information in the /etc/passwd file in a compatible format, and the password is stored as a single "x" character (i.e., not stored in this file). The /etc/shadow file is readable only by the root account and is, therefore, less of security risk" (Linux). We need to be aware that hackers will try to use any means to crack passwords. If an attacker can access the computer as a regular user, they can run any number of password cracking programs against it.  A shadow password could eliminate this type of attack by storing the password hashes in the / etc / shadow file readable by the root user. This forces the potential attacker to try to discover the password remotely but the attacks are much slower and leave visible traces, as failed connection attempts are logged to the system files. "Hackers can calculate the percentage of passwords which can be cracked with the implemented algorithm given several guesses" (Morris, 2019, pg. 745).

2. Computer hacking can be justified and there are specific guidelines when this is applicable. As we know the rapid pace of technological advancement often makes even prudent legislation obsolete after a relatively short period of time. The Health Insurance Portability and Accountability Act (HIPAA) is dated from 2003, however, an update on the privacy rule on the health data legislation provides de answer to this question. First, let's see what constitutes a security breach in this new privacy rule. "An impermissible use or disclosure of protected health information is presumed to be a breach unless the covered entity or business associate, as applicable, demonstrates that there is a low probability that the protected health information has been compromised based on a risk assessment of at least the following factors" (HIPAA). As we can see, it sounds logical and feasibly to "hack" a computer under the emergency circumstances as long as the hacker can demonstrate it was done under the condition prescribed by law. The HHS HIPAA Privacy Rule further clarifies this procedure. "Covered entities may use and disclose protected health information without individual authorization as required by law (including by statute, regulation, or court orders). Covered entities may also disclose to law enforcement if the information is needed to identify or apprehend an escapee or violent criminal" (HHS, 2000).
 
3. The term cyberstalking appears in the media with increasing frequency. Cyberstalking may cause psychological distress similar to that of real-world stalking" (Dreßing, et al., 2009). Cyberstalking continues to be a major problem in the US, and it is as rampant as ever, despite efforts by major technology companies to reduce bullying and harassment. The majority of the cyberstalks are men and the majority of the victims are women. In many cases the cyberstalking and the victim had a prior relationship, however cyberstalking by strangers is increasing due to the easy access to social media victim's information, including pictures, phone numbers, addresses, etc. In January 2020, a Texas man was arrested and charged with cyber-stalking female real estate agents in the Waco area. The investigation began in Texas after about a half-dozen female real estate agents in the Waco area received sexually explicit photographs sent from cellphone numbers they didn't recognize. They also received photos of their own children, evidently copied from social media pages. The photos of their children were accompanied by descriptions of what the stalker, or stalkers, would like to do to the children sexually, according to detectives" (KLTV, 2020)

Reference no: EM133191895

Questions Cloud

Relationship between memory and learning : PSYC 303 American Military University-Discuss, with adequate detail, Maslow's Hierarchy of Needs and provide an example of how his structure allows people
Discuss the selection process for a federal judge nominee : SOC 205 Strayer University - Discuss the selection process for a federal judge nominee, including the background checks, senatorial courtesy, the confirmation
What form of business organization would be best : University Of California Los Angeles - What form of business organization would be best for your business and why? Consider all reasonable alternatives
How do you apply the transitions theory : The transitions theory incorporates intervention and comprehension of what has taken place. How do you apply the transitions theory to current nursing practice
Write about device seizure from the producers paraben : American Military University - Write about Device Seizure from the producers Paraben and Device Seizure will still have the capabilities of acquiring
Write a summative paper on an environmental pollutant : Write a summative paper on an environmental pollutant of your choice that is a known issue in your community. Identify the known pollutant.
Write about a dream that really made an impact : Keiser University-Write about a dream that really made an impact on you. It can be a recurring dream, a scary dream, a happy dream, or an especially vivid dream
Explain the differing roles of nursing leaders : Explain the differing roles of nursing leaders and nursing managers in this instance and discuss the different approaches they take to address selected issue
Assignment on anorexia nervosa : PSY 7310 Capella University-Anorexia nervosa has both environmental and physical causes. Identify and discuss these two causes and what specific factors

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Legal environment of business caselet

The assignment in Law deals with the topic "Legal Environment of Business". A case study about Mary, a newly joined employee who is working in the USA and Europe. She faces few issues at her work place in Europe and tries to talk to her manager who s..

  Business ethics & legal issues caselet

This assignment is about the concept of Business Ethics & Legal Issues. The laws relating to these can be found in Antitrust laws. These laws are concerned with those large corporations which have a majority of market share, mergers and acquisitions.

  Questions on business law and ethics

Examples of securities that are exempted from the registration provisions of the 1933 Act and involving misstatement of material facts in a prospectus.

  Discuss the doctrine of ratification of pre-incorporation

With the aid of a decided cases, discuss the doctrine of ratification of pre-incorporation contract.

  Discuss the extent of phoenixing activity

It has been estimated that about 6,000 phoenix companies operate in Australia, costing government and the community hundreds of millions of dollars per year and impacting on individuals.

  Application of law to facts

Company Law, Application of Law to Facts and Conclusion.

  Question on business law and ethics

This assignment related to business law.

  Questions on business law

Answer all the questions under business law.

  Iidentify the issue raised by the facts

Iidentify the issue(s) raised by the facts, identify the relevant legal principles, apply the relevant legal principles to the facts, reach a conclusion.

  Evaluation of software development

Prepare a report and present an evaluation of the subsequent methodologies for software development in terms of cost, resources and time.

  Business value and ethics

Business value and ethics,  Bart agrees to put Sam's Super Bowl champion-ship autographed football in his sports store to sell for $1,500. Sam agrees to pay Bart a 15% commission for selling the ball. If Joe comes in the sports store and offers Bart ..

  Explain what is meant by income by ordinary concepts

Advise what tax consequences arise in respect of the payments.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd