The Criminal Justice System

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Chapter 10

Exercise 3:

While there are many Assurance Providers in the market today, my research shows that Symantec, by Norton Anti-Virus is by far the best-recognized service out there. Symantec helps build confidence on all types of websites, and since we have invested time and money developing on our website with great content, optimizing it for search engines, and investing in online advertising we need visitors to find us. However, once they locate us we have to make them feel safe with our site for them click, call or buy. With Symantec, customers recognize the Norton secured seal as a trusted trademark for their private and financial information. We can increase our site traffic by reaching customers early in the purchase cycle by making our link stand out in search results on enabled browsers and with partner sites. We can draw in more customers by reducing the risk of being blocked by search engines and browsers who use automatic malware detection. Symantec will scan our site for malware on a daily basis and immediately notify us of any attacks.

Features:

Benefits:

Leading provider of trust online, this makes it, trusted by major banks and retailers.

Users may experience fewer warning messages when trying to run your application.

Most recognized "trust" seal by consumers.

users can be more confident in your identity and the integrity of your application.

Reputation in Windows 8 and Internet Explorer 9

Compatible with Android, Microsoft Authenticode, Java, Microsoft Office/VBA, Adobe AIR, Windows Phone and Apple IPhone

Extended Validation Authentication

Hardware Token and PIN Included in Signing Process

EV Code Signing certificate can only be used by the designated developer at his workstation.

Digitally sign 32-bit and 64-bit user-mode and kernel-mode software

Free 24/7 Support

Case 1

Exercise 1:

The firewall provides a defense between a series of networks or a network and the internet, acting as a security blanket for secured, controlled, and audited transactions to filter predefined packets flowing in and out of the network. The firewall should not stop people from doing business but restrict anyone and everyone, including employees, from getting personal information if they do not have a need to know it. Additionally, a firewall should have been placed at each location that had an external connection to the internet so that if a perimeter was broken, the system would automatically shut down. In order to prevent access to its transaction servers, a company would have to set up a secure channel in which to communicate with its clients, such as SSL, TSL, or PPTP.

Furthermore, if multiple firewalls are used, they all must react to each situation the same way; one firewall cannot block information, while another allows it. Any unnecessary software on the firewalls should also be removed. Secure connections through external firewalls ensure that information will be secure so that hackers cannot steal the information in transit. External firewalls can also ensure that data is being processed from one system to another without interference. In addition, encryption can establish a secure channel inside LAN’s and WAN’s. Firewall‘s also protect against brute force attacks by hiding the core machines that hold the customer's transactions.

If a firewall is configured and maintained properly, it can be a very powerful tool that helps protect important information. Another option to secure consumer information is encryption; this process transforms readable information into unreadable data using an algorithm. Only those with the key to decipher will be able to transform the data back in to a readable format. While encryption cannot prevent a website from being hacked, it can render the data useless and is an important step in processing, loging data, transferring data, and ensuring that the data is secure and the destination is trusted. Prevention must also be addressed but with other security methods such as passwords, training and company policies.

Exercise 3:

Computers we use are advancing every day, and we are being taught that to succeed in today’s electronic world, we should have web or social media site. Many people think that the computer will help in providing all the answers. While we are "connected on -line" we must remember that there are people out there looking to steal personal information to use for illegal activities.

Data breaches occur when personally identifiable information such as names, social security

numbers and credit card numbers are accidentally lost or maliciously stolen. These breaches can

result in hundreds of thousands of compromised records, and lead to identity theft and related crimes.

In an effort to reduce these crimes, many states have responded by adopting security breach laws in response to an escalating number of criminal hackers gaining access to consumer databases.

Beginning in 2002 with California’s SB 1386, laws have been passed to ensure notification to the consumers if a breach of information has occurred. Security breach notification laws are state laws that require organizations that maintain personal information about individuals to inform those individuals if the security of their information has been compromised. The Act requires organizations to notify individuals in a timely manner, if personally identifiable information has either been lost, or is likely to be acquired, by an unauthorized person, and is reasonably considered to compromise an individual’s personal information.

Consumers feel that they have the right to be informed when firms use or abuse their information. Having being notified of a breach of their personal information, consumers could then make informed decisions and take appropriate actions to prevent or mitigate the impact of identity theft. For example, to lessen their risks, consumers who have been notified of a breach can contact their bank, their credit card merchants and law enforcement; they may close unused financial accounts; and they can place a credit freeze or fraud alert on their credit report. This is why I believe these laws should remain in our criminal justice system.

As one possible negative impact, some lawmakers feel these types of laws should be abolished. This legislation could lead to some customers trying to illegally profit from a situation that has not or did not occur. Customers could blame the company for unwanted spam on their computers, and or junk mail received through the postal system. A simple mistake by their bank could lead a customer to believe that someone is stealing their money. With time being an issue, what if the company delays informing the customers of the problem. This could increase the number of lawsuits.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now