This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: 1/28/10 Wireless Networks Key security features o Encryption method- WEP- WPA o Strong key SSID o Open or Hidden MAC address restriction Implication of Cybercrime Workload- What resources are available to investigate and prosecute these cases? Practical and Policy implications of this prosecution workload for Cyber Crime Enforcement A Zero Sum Game If I work on one type of case, it limits my works on another case of a different type during that same period of time Every case I take becomes a policy choice about what crimes does not get prosecuted- Example How criminals take advantage of this How offenders play the Zero Sum Game They do things to district people like me Some e.g. - Hackers are helping sex offenders- Sophisticated hackers help script kiddies- Organized crime groups redistribute stolen data to other person to muddy the waters...
View Full Document
This note was uploaded on 04/18/2011 for the course BUS 293 taught by Professor Brown during the Winter '09 term at Indiana.
- Winter '09