Verified Document

How Cyber Criminals Hack Into Businesses Essay

. Discuss two ways technology has changed human behavior in the past 20 years. Use specific examples.

Technology has impacted human behavior in a litany of ways. First, it has contributed to increased productivity and efficiencies for both businesses and customers. Technology has also allowed the company to grow at a much more rapid pace through innovations. Microsoft and Google are common exampled of how technology has changed human behavior. Routine and mundane tasks have now become automated. This automation has caused businesses to become much more efficient with certain activities. The time saving resulting from these efficiencies results in increased profits, higher margins, and a better work environment. Human behavior has changed as they can now focus on much more complex tasks that cannot be solved by a computer. These task are often value-added tasks that help to provide much more value to the business as oppose to the more routine tasks.

One of the more controversial elements of technology relate to its impact on social relationships. Here, many argue that technology has been a detriment to face-to-face interactions. The advent of social media, online group chats, and video gaming has created a community that shuns human interactions. This lack of interaction has created a often divided social construct where individuals are more much visceral in their dialogue. Individuals, who can hide behind a computer screen and are often anonymous can engage if very offensive dialogue on online forums. Studies have show that this negative and offensive language, particularly for young children can have an adverse impact on them later in life. For example, cyber bullying has been shown to contribute to higher rates of suicide and depression (Hinduja, 2013).

Social media has also changed human behavior over the past 20 years as well. Here, Instagram, Facebook, and Twitter, allow market participants to bend the rules of reality in their favor. Here many individuals attempt to show a lifestyle which they believe others will find favorable even if it does not represent reality. Here, studies have shown the individuals often lie about their own lives on social media to attract attention. This attention seeking leads people to value themselves based on other opinions of them. This ultimately dilutes the value of individuality as everyone is looking to be the same thing to everyone. In this instances, women will show sexy photos of themselves to validate their appearance to me. Instagram in particularly is...

Likewise, the men are looking to show wealth and power and therefore look to show items of value. These items include money, cars, women, and vacations. Often both are simply faked or scripted in order to gain public approval. This ultimately undermines the individuality present in other human beings and makes people shallow as it relates to material items.

2. Explain what subcultures are and how the growth of the internet has affected how members of subcultures communicate.

A subculture is a group of people within a culture that differentiates itself from the parent culture to which it belongs, often maintaining some of its founding principles. Subcultures develop their own norms and values regarding cultural, political, and sexual matters. In this instance subculture examples include goths, emo, geeks, and so forth. The internet has allowed this subcultures to find their place of...

…crime. For more information. The process is somewhat different from traditional means as cyber warrants must focus on content as oppose to the physical storage media.

3. Describe the process of extracting and processing evidence from the seized materials.

First the process begins with a consultation with the case investigator about the case. Here the analyst explains what the forensic examination may or may not discover. Here the extraction process begins with a discussion on what the forensic processes need to be performed. This can include fingerprints on a computer, tracing, and DNA analysis on a cell phone used to engage in the hacking. Next the analyst determines if additional information regarding the case is needed. This can include network configuration information, ISPs used, email addresses, and system login records. Next the analyst most asses the skill level of the hacker involved. This is important as the hacker may have destroyed or concealed evidence during the extraction process. Finally an assessment is made of the evidence extracted.

4. Identify and explain a court case whose findings might apply to this investigation and the prosecution of the offender.

Two decades ago, a group of enterprising criminals on multiple continents hacked into the electronic systems of a major U.S. bank and secretly started stealing money. The only location where money was actually transferred within the U.S. was San Francisco. Investigators pinpointed the bank accounts there and identified the owners as a Russian couple who had previously lived in the country. When the wife flew into San Francisco and attempted to withdraw funds from one of the accounts, the FBI arrested her and, soon after, her husband. The hackers pled guilty and were sentenced to…

Sources used in this document:

References

1. Burruss, George W., Bossler, Adam M. And Holt, Thomas J. (2012). Assessing the mediation of a fuller social learning model on low self-control’s influence on software piracy. Crime and Delinquency, 59(5), 1157-11842. Hinduja, Sameer and Kooi, Brandon. (2013). Curtailing cyber and information security vulnerabilities through situational crime prevention. Security Journal, 26(4), 383-4023. Vijayan, Jaikumar. “Target Breach Happened Because of a Basic Network Segmentation Error.” Computerworld, Computerworld, 6 Feb. 2014, www.computerworld.com/article/2487425/target-breach-happened-because-of-a-basic-network-segmentation-error.html#:~:text=Security%20blogger%20Brian%20Krebs%2C%20who,at%20a%20number%20of%20locations.

4. Winter, Michael. “Home Depot Hackers Used Vendor Log-on to Steal Data, e-Mails.” USA Today, Gannett Satellite Information Network, 7 Nov. 2014, www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/.

2

Cite this Document:
Copy Bibliography Citation

Related Documents

Criminals -- Born or Made Since the
Words: 2372 Length: 7 Document Type: Essay

Criminals -- Born or Made Since the construction of the first civil society, behavioral rules distinguishing what is acceptable and what is criminal have existed. Even though individuals typically have a concept of conventional moral behavior, criminal conduct is represented in every society and culture. Criminal deviance is not a novel construct, and has long been the intrigue of researchers, philosophers, and theorists to determine criminal motivation and link the relationship

Criminals Face Court Every, Single Day in
Words: 1354 Length: 4 Document Type: Term Paper

Criminals face court every, single day in all fifty states for a variety of crimes. Some are mentally disabled, some suffer from acute or chronic mental illness, and some are of sound body and mind. In order to differentiate which person if fit for trial, the Legal Standards for Competency are used in order to avoid any added difficulties during the trial. The questions however is, are these standards helpful

Criminals/Terrorism on Freeweb, Internet Unclassified//For
Words: 823 Length: 2 Document Type: Term Paper

In LA County, file appropriate STEP Act reports outlined in Manual of Policy and Procedures to alert CLEAR / HEAT / SAGE officers in your division Since Internet gang activity is not limited to particular neighborhoods in any geographic location, Law Enforcement must respond in the same way. Gang officers will report intrastate activity to the DOJ and FBI but those agencies have resources all officers can use to recognize

Criminals Language From a Psycholinguistics Point-Of-View
Words: 2000 Length: 7 Document Type: Literature Review

Criminal Psycholinguistics as a Predictor and/or Indicator of Criminality (rewritten for grammar) Language is used differently. Humans use it in many forms and in many means. As it represents someone's character, language helps everyone to perceive what kind of profile a person has. Thus, this brought the researcher to explore the psycholinguistics of criminals. In this thesis, the researcher will focus mainly on the collective study in determining a criminal based on

Logic of Sentencing Criminals Humanity Has Always
Words: 1234 Length: 4 Document Type: Essay

Logic of Sentencing Criminals Humanity has always dealt with the problems related to crimes committed against both individuals and the public. Philosophers, judges, lawyers, public figures, government officials, and corrections institutions have proposed many forms of punishments or treatments to deter public and individual crimes in a given society. These punishments and treatments have built upon the past theories and ideas and also responded to the needs and interests of the

Psychology of Criminals in Correctional
Words: 1200 Length: 4 Document Type: Term Paper

There is ample evidence in the literature supporting environmental, familial and socio-economic causes for mental illness among the incarcerated, including lack of familial support, financial status or access to quality healthcare (Pustilnik, 2005). Among the more common illnesses that temporarily abate but often become worse after release provided those incarcerated receive therapeutic treatment in prison include depression, anxiety and drug and alcohol dependence (Pustilnik, 2005; Bowers, 2000). It is Bowers

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now