Sunday, February 16, 2020

E-crime against Stilianos Assignment Example | Topics and Well Written Essays - 2500 words

E-crime against Stilianos - Assignment Example This study looks into electronic crime, a new phase of technological mishap that to a large extent thwarts the effort of achieving secured information system and network system running. Electronic crime or e-crime basically refers to a situation whereby crime is committed by the use of technology. In most cases, these crimes are committed by against information systems and other technologically enhanced systems. Typical examples can be given as the invasion of a person’s bank details by the use of technology or breaking into the database system of a university by the use of technology. It is in this direction that Crime Wales notes that â€Å"e-Crime generally refers to a criminal activity where a computer or computer network is the source, tool, target, or place of a crime.† Crime Wales therefore concerns a deliberate attempt to invade or harm a computer system. This is very common today because of the general growth and use of technology and technology tools. It can b e observed that modern growth in technology use has resulted in a situation whereby all major global institutions are hooked unto a network in one form or the other. Very common among these network systems are the use of the systems to create electronic commerce and protection of data from public domain. E-crime is a major form of cyber threat that has resulted in a lot of advocacy programs to combat the situation. The e-crime Bureau therefore notes that â€Å"The development of appropriate legislations and policies across corporate and government departments is an integral aspect of mitigating the cyber threat.† ... It will be noted that â€Å"Linux is a multitasking, multiuser operating system, which means that many people can run many different applications on one computer at the same time† (Grove, 1998). By this, there is a very high change of taking advantage of the multiplex nature of the accessibility core of the Linux. But indeed, the mere fact that Linux allows for multiuser system does not permit just any person to break into the system of other people. From the case study, it can be noticed that there is a particular hub that has been invaded by whoever is behind the plot. There confirmation that there was a specific target on one of the hubs is the fact that when nmap scan of the suspect system was done using the IT technician’s laptop, there were conflicting output listings as against the running of the lsof program to list the open transport layer network file descriptors on the same suspect system. Basically, Linux operates with a shell. A shell has been explained as â€Å"a program that takes the commands you type and translates them into instructions to the operating system† (Grove, 1998). In the person’s effort to invade Stilianos’ system without Stilianos’ notice, it is very much likely that the shell was the first system component to be tampered with. It is for this reason that according to the case study, two listening services on TCP ports 3457 and 32411 did not show up when viewed from within the system. b) Answers to the following questions: When and how Stilianos’ machine was initially compromised? The indication has already been given that the shell might have been tempered with as the first move to invade Stilianos’ system. As far as the shell of the Linux system

Sunday, February 2, 2020

A sole trading business in Western region Assignment

A sole trading business in Western region - Assignment Example A sole trading business in Western region This international buying and selling of flowers by the sole trading business would be able to take advantage of the several measures taken by the government in improving the performance of the flower industry of UAE. The sole trading business under the name of Florist Fragrance would be in an advantageous position as they would be able to gain from the benefits of the innovative logistics centre set up for the trading of flowers. This would help the sole trading business to deliver the orders of their flower products to the international markets with less time and high quality of flowers with customized fragrance for their customers especially in the western markets. The business of sole trading under the name of Florist Fragrance would face specific disadvantages due to the product chosen for the international buying and selling in the western markets. Despite the resources and facilities available in the flower industry for quick delivery of the flower and the accessory products, the international business faces the disadvantage due to the high volume of cost to be incurred for restoration of the quality and fragrance of the flowers to be delivered to the customers. The flowers are considered to be perishable items which have a fixed span of life beyond which the products perish. The sole trading business are thus required to ensure that the flower goods and the orders of the customers reach them in the overseas market in the proper condition as delivered during the point of sale.