More Subjects
[Your Name]
[Instructor Name]
[Course Number]
[Date]
IT
Cybercrimes have changed significantly with the advancement in technology over the years. A decade or so ago, cybercrimes were conducted by a single man. The one-man cybercrime perpetrator sought to exploit vulnerabilities within a computer network. Most of the cybercriminals were the nerds who were obsessed with exploring newer avenues and there were not any financial motives behind it (Conteh and Royer, 4). However, in recent years, the domain of cybercrime has transformed into a well-organized branch of crime. Large groups are perpetrating cybercrimes for financial gains. Some of the most recent types of cybercrime include cyber-extortion, information theft, and phishing attacks. Cyber-extortion is done by cybercriminals to extract large amounts of money from big corporations by threatening them to exploit their vulnerabilities. In information theft, cybercriminals might steal valuable information from a corporation for financial gains. In phishing attacks, criminals might obtain sensitive information such as credit card and bank account details (Conteh and Royer, 3).
Large organizations have started offering cloud services in recent years. The most notable companies to offer cloud services are Amazon, Google, and Microsoft. The large amounts of computing resources provided anonymously offer a ripe opportunity for cybercriminals to steal vital information placed on the cloud. Cloud computing has changed how the digital data and evidence were collected and retrieved in case of cybercrime. Since the data on the cloud is stored in various locations. Cloud computing has ensured that digital evidence which is collected maintains its integrity to be beneficial in the legal proceedings.
The benefit of cloud computing in forensic investigation is that investigators can access data quickly in case of an incident of cybercrime (Aziz, Fouad and Hassanien, 2). A challenge facing the integration of cloud computing in forensic science is that in traditional evidence collection, investigators can explain to the jury about the nature of the evidence using legal jargon. However, it is a challenge for the investigators to comprehensively explain the data before the jury (Aziz, Fouad and Hassanien, 3).
Works Cited
Aziz, Amira Sayed A., Mohamed Mostafa Fouad, and Aboul Ella Hassanien. "Cloud computing forensic analysis: trends and challenges." Multimedia Forensics and Security. Springer, Cham, 2017. 3-23.
Conteh, Nabie Y., and Malcolm D. Royer. "The rise in cybercrime and the dynamics of exploiting the human vulnerability factor." International Journal of Computer (IJC) 20.1 (2016): 1-12.
More Subjects
Join our mailing list
© All Rights Reserved 2024