1) Please describe how the market for malicious software, where cybercrime tools are sold on a fee-for-service basis, affects the nature of hacking and the skills necessary to engage in cybercrime. Also, please explain how tools like ransomware exemplify why this market persists.
2) Read the following story, and answer the questions below:
A hacker going by the handle “weev” was arrested in 2011 after using an unknown flaw present in the website architecture of an AT&T website to identify email addresses of iPad users on their network. The site security was essentially misconfigured, and simple manipulation of a url led weev to be able to view sensitive customer information. No larger data breach or system intrusions were used, simply changing a site url. Additionally, he notified the media, specifically the website Gawker, to discuss the breach and findngs before contacting AT&T. As a result, the FBI opened an investigation and he was prosecuted under the computer fraud and abuse act. He was eventually sentenced to 41 months in federal prison.
Using the various readings, please explain how this hack demonstrates the norms and values of the hacker subculture, and explain what sort of hacker you believe weev to be relative to the various categories of hackers that are known. Finally, explain whether you think prosecuting weev was justified if there was no actual intrusion that occurred and there was evidence of security flaws on the part of AT&T.
3) We live in a globally connected world thanks to the Internet. There is, however, no consistent country-level standard that exists for collecting reports of cybercrime by police agencies. Please explain why this problem exists, focusing on the US specifically. What factors appear to hinder the ability of the US policing structures that limit its ability to effectively collect statistics on various forms of cybercrime? (10 points)
4) Though private industry owns and operates the majority of all Internet-related infrastructure, the government has clear role in enforcing laws that affect their operation and security. Explain why public-private partnerships are essential to help in this response, and what they are. Use specific examples from the various readings you have to support your argument. In particular, give at least two examples of specific partnerships used to handle computer hacking and malware threats.
5) Please read the following, and then answer the questions below:
Flame malware has been identified in many parts of the Middle East, which enables attackers to collect information on the users of the compromised system, including audio, screenshots, keystrokes, and even collect information on nearby Bluetooth devices. The code was initially identified by the Iranian National CERT, and AV vendors. Their analyses suggest that the software can compromise antivirus software, and act as a rootkit. The malware can spread autonomously and also receive commands from a server, ranging from adding additional software to a completely kill switch to eliminate traces of the code. The code was extremely complex, utilizing five different forms of encryption and was substantial in size. Lastly, the malware appeared to target Iranian IP addresses and sought out pdfs and industrial control design program software.
Based on this description, how would you characterize this sort of malware relative to the variations you’ve read about (e.g., virus, worms, trojans, blended threats). Be specific in your response as to why and how you think a certain description is more appropriate. Additionally, do you think this would have been created by a nation-state or non-nation state actor and why? What information or use could be achieved through this tool that would explicitly benefit a nation-state or individual actor?
6) Computer hacking is argued by some to be effectively analogous to burglary. Explain why such a parallel may be drawn, and also explicitly elaborate on why and how hacking techniques could be used to facilitate malware, and data theft.
7) Criminal actors can readily use of deception in online spaces to achieve various objectives. Give three different examples of how deceptive practices can be employed to victimize individuals online, and make sure you highlight at least one form achieved through deceptive email messaging, and another through websites or social media. Be specific in the techniques the offender can use to deceive potential victims.
8) Define and differentiate cyberdeviance from cybercrime, and also cyberterrorism. Use specific examples and citations to the various readings provided from the textbooks to support your arguments.
9) Explain the relationship that exists between vulnerabilities and exploits, how they are identified, and what role they serve in hacking and malware.
10) Based on the materials you have read thus far regarding the application of criminological theories, how well can we account for cybercrime using routine activities theory and individual-level theories like low self-control? Give specific examples to support your answers.
* I will provide access to the course materials to be used
*these are just short answer responses, not essays
*please number each response according to the way i provided the questions
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount