Computer Crime Technology

Document Type:Research Paper

Subject Area:Criminology

Document 1

Developing new ways to fighting computer crimes and crime in general is partially solution to crime reduction (CSIRO, 2015). Technology measures enhanced security, and internet flexibility. Keeping for technology creativity remains significant in factor in fighting crime. EMERGING TECHNOLOCAL MEASURES Smart Card Smart Card is a small device embedded with microchip which store larger quantity data, encrypted and links with gadget. It is identify and proposed as the ideal technology which can combat fraud and online identify theft. Domain Name System Security Extensions. American chapter 2 of cyber criminals outlines and encourage the use of Domain Name System (DNS) to prevent users from phishing through the use of malware and websites scam. American internet corporation assigned names and numbers, suggested the application Domain Name Service Security Extension as a strategy of addressing the risks associated with the domain.

Sign up to view the full document!

It's DNSSEC has been existing for the last eleven years but has not spread. DNSSEC is a security features with the Domain redirecting the genuine internet protocol address in the domain network system to given a sequence of unique digital signature required to be matched authenticity. Microsoft identify security lapses and risks the users are exposed in three dimension. One, majority of user upsurge security lapse by using similar credential longing process in different networks. While several browsers have automatic password saving options. Two, users access their accounts using various non-standard webpages making it impossible for them to identify phishing page. Third, Users are asked to feed their personal details including contact numbers address, date of birth, Identification card copy to a third party rising security privacy issues and making them vulnerable for hacking and cyber crime To address the issues, Microsoft recommended the use of metasystem that connects but not replace existing online procedures for access authorization.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable