22-1 - 1/28/10 Wireless Networks Key security features o...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1/28/10 Wireless Networks Key security features o Encryption method- WEP- WPA o Strong key SSID o Open or Hidden MAC address restriction Implication of Cybercrime Workload- What resources are available to investigate and prosecute these cases? Practical and Policy implications of this prosecution workload for Cyber Crime Enforcement A Zero Sum Game If I work on one type of case, it limits my works on another case of a different type during that same period of time Every case I take becomes a policy choice about what crimes does not get prosecuted- Example How criminals take advantage of this How offenders play the Zero Sum Game They do things to district people like me Some e.g. - Hackers are helping sex offenders- Sophisticated hackers help script kiddies- Organized crime groups redistribute stolen data to other person to muddy the waters...
View Full Document

This note was uploaded on 04/18/2011 for the course BUS 293 taught by Professor Brown during the Winter '09 term at Indiana.

Page1 / 2

22-1 - 1/28/10 Wireless Networks Key security features o...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online