Preview

Monsegur Research Papers

Good Essays
Open Document
Open Document
303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Monsegur Research Papers
The FBI immediately put Hector X. Monsegur to work for three years to bring down the other top hackers in his group. 300 cyber-attacks were stopped and charges were given to six alleged hackers. Some of Monsegur’s crimes consisted of “three counts of conspiracy to engage in computer hacking, computer hacking in furtherance of fraud, conspiracy to commit access device fraud, conspiracy to commit bank fraud and aggravated identity theft” (Chad Bray). Most black hats should be dealt with in this manner; use their talents to catch other hackers first and then decide if he’s worthy of a pardon. He helped bring down a big threat, but that is no reason to set him loose. If the authorities hired more white and gray hats instead of jailing them and used captured black hats as a counter offense they could all prove very beneficial. …show more content…
Once the hierarchy is disrupted, the authorities should follow the plan mentioned in Hacker’s Bazaar: The Markets for Cybercrime Tools and Stolen Data. It suggested that people prepare for hackers before an attack and not after they realize that they are defenseless. Computer owners should simply build strong complex passwords, be careful clicking links in emails, and be cautious when entering their credit card information. Commercial companies should teach their employees safe internet practices as well and train them to recognize suspicious sites, emails, and spam. They also proposed that the authorities set up traps for malicious hackers such as: fake credit card shops, fake websites, fake forums and more things that black hats usually target. Nevertheless, bringing down the black market where hackers get most of their tools would hinder millions of cyber-attacks. (Ablon and

You May Also Find These Documents Helpful

  • Good Essays

    Volibear Research Papers

    • 893 Words
    • 4 Pages

    Volibear is a playable Polar Bear champion in the popular MOBA(Multiplayer online battle arena) game known as LoL(League of Legends). Volibear primary role is Fighter(Style) while his secondary role is Tank(Style). He mostly played in the Top Lane(Roles) and Jungle(Roles) in LoL. Volibear has one passive and four abilities that he uses to fight against champions on the battlefield of Summoner Rift(Battlefield). Volibear passive is called Chosen of the Storm, if his health hits critical level he rapidly heals himself for a few seconds. Volibear first ability is called Rolling Thunder, he drops on all fours and runs at nearby champion and flips the first champion he attacks behind him. Volibear second ability is called Frenzy, he repeatedly attacked three times, so he can perform a vicious bite to a champion. Volibear third ability is called Majestic Roar, he lets out a powerful roar that slows and damages nearby champions. Volibear fourth and final ability is called Thunder Claws, he erupts in a chain attack of lightning, damaging nearby champions. Volibear has five skins he can use in battle. First skin is called…

    • 893 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Good Essays

    “The 2003 California Young Reader Medal goes to Ben Mikaelsen.” That’s right in Ben Mikaelsen has won many awards and has made amazing books such as Petey and Touching Spirit Bear. His articles about Touching Spirit Bear have appeared in many articles of today’s world and in many magazines.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Good Essays

    FOR 6 MONTHS in 2009- there were 58 dems and 2 independents in US senate, allowed obamacare to pass because all 60 voted for cloture when republicans filibustered, this is why the bill turned out to be a mess…

    • 935 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Berthe Morisot was Born January 14, 1841, in Bourges, France. Berthe Morisot 's father was a high-ranking government official and her grandfather was the influential Rococo painter Jean-Honoré Fragonard. She and her sister Edma began painting as young girls. Despite the fact that as women they were not allowed to join official arts institutions, the sisters earned respect in art circles for their talent. She was born into a family that, according to family tradition, had included one of the most prolific Rococo painters of the ancien régime, Fragonard, whose handling of color and expressive, confident brushwork influenced later painters. By age twenty, she had…

    • 986 Words
    • 4 Pages
    Better Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    High technology gives criminals the opportunity to obtain valuable information. They are considered a cyber-threat. Criminals usually get illegitimate or legitimate work-related access to a company’s computer resources to sell wanted information.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Capstone Analysis

    • 285 Words
    • 1 Page

    Regular stories featured in the media on computer crime include topics covering hacking to viruses, web hackers, to internet pedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. The increase in cybercrime has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for the legal system, as well as for law enforcement. Some of the things I do to try and prevent falling victim to cybercrime is keeping the latest version of virus software on my computers. Using strong passwords that only my family knows. I do not fall prey to online offers of things like free TVs, or you have won $1,000.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    One of the most important aspects a leader should possess is the ability to change his approach to the dynamic environment and culture that leaders phase in all organizations. Jawarlal Nehru said “A leader or a man of action in a crisis almost always acts subconsciously and then thinks of the reasons for his action”. In this thesis I will like to point out two significant events that have changed my leadership style and will carry over not just to my military career but my personal life as well. The first crucible, that has helped to make me a better leader as a young battery commander I had with one of my Lieutenants that changed my approach towards what I believed is the perfect combination of a strong character leader and the sensitivity every leader should display at all levels of command. The second crucible event I will describe in this paper is the experience of working for a toxic leader who was reluctant to listen, understand and visualize problems during critical situations. As a future organizational leader I believe leaders need to understand and facilitate the legal orders given by their superior officers and at the same time display respect to the Soldiers affected by such orders. The organizational leader is the most important leader in the military because is the bridge that senior officers use in the military use pass order down the chain of command while at the same time the organizational leader needs to recognize the subordinates needs an pass these needs up the chain to the senior leadership to reach harmony in organization’s climate.…

    • 1751 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The Rainmaker

    • 506 Words
    • 3 Pages

    Enticing readers and basically giving people something good to read, John Grisham is an established star in literature. What makes his books so great is that they are so realistic. He applies his personal law and trial knowledge into the books he writes. Put together with creative story telling, his makes his novels hard to put down.…

    • 506 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Adhering to regulations and policies provide the best solutions to enforce security. Adversaries continue to deploy new software to breach systems infra-structures. Users must utilize the same vengeance in seeking additional training to aid in protecting communities with relevant information. The best security approach is proactive not reactive.…

    • 827 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Organized Crime

    • 375 Words
    • 2 Pages

    One new trend in organized crime is cybercrime. The key to it is social engineering. Hackers can easily persuade someone now a days to do things on their computer that is not in their best interest and the internet is assisting them.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays