Saturday, February 22, 2020

Transnational Crime Essay Example | Topics and Well Written Essays - 2000 words

Transnational Crime - Essay Example These include drugs such cocaine which is harvested in the jungles of Columbia before it makes its way to the cities of London, New York and Paris. In Afghanistan, the poppies of this country are harvested, sent to heroin processing plants in Eastern Europe before they find their home in the veins of Western Europeans and North Americans. In addition to the globalisation of drugs and the internationalisation of narcotics, globalisation has increased the incidents of piracy, counterfeit goods and organ trafficking. Perhaps most insidiously, globalisation has paved the way for an international traffic in people which involves the smuggling of refugees in addition to the international traffic of women. While some women are trafficked to work as domestic servants or as migrant laborers, the majority are sold into sexual slavery and exist as 21st century slaves. While international piracy, the spread of international counterfeit goods and organ trafficking are all interesting subjects the study from a sociological perspective in light of the internationalisation of crime, due to the limited scope of this analysis the following will focus upon the international traffic of women as well as the internationalisation of drugs. Since the global traffic of women for sexual servitude is perhaps one of the most insidious byproducts of the globalisation movement, the following will begin with an overview of this exploitative trade. â€Å"It is clear that organised crime is going through a period of rapid and dramatic change. Globalisation is reshaping the underworld, just as a combination of evolving law-enforcement strategies and technological and social change is breaking down old forms of organised crime (monolithic and identified by physical â€Å"turf† or ethnic identity), and creating new, flexible networks of criminal entrepreneurs†. Accordingly, complex economic interdependence has increased the avenues for

Thursday, February 6, 2020

Honeynets implementation Case Study Example | Topics and Well Written Essays - 2000 words

Honeynets implementation - Case Study Example To ascertain the effectiveness of the project in administering the foresaid role, I have done sufficient research about the reliability and convenience of the system in managing the task and have found it much viable and efficient. The research done covered a wide scope including monitoring and getting feedback with those already with the system. I have also done hypothetical hacking techniques and in all the cases, the project has proved beyond hacking. I therefore strongly recommend the project for your institution to cushion form such possible attempts. Best regards. Executive Summery During the month of February, we received a formal communication to design a system security than would be hackers proof since the existing one was frequently being intruded in. It did not provide a resistant guard to hackers. Following this communication, we designed a study to help the company in the following ways; I. Keeping intruders outside the production system in disguise while they think the y are inside the main production system. II. It recognizes any intrusion attempt. This is because any operation found within it can only be from an intruder. III. Cheaper to manage; it can be virtually supported as opposed to those that are physically supported. IV. Recognizing and storing the pattern taken by the intruders to help our experts advance a quick counter response. During the month of February, hackers intruded into the production line system of the company. As a result of the intrusion several information were altered within the production system and the company lost very crucial operational and management data. In this regard, the company is estimated to have lost about $ 150,000. As a result of our in depth feasibility study, we established the following criterion for the system to be adopted; a) Can be virtually supported b) It has significantly low cost of maintenance c) It gives the identity of the hackers d) It is difficult to penetrate by hackers In this regard, we want to confidently appeal for company’s management to ratify the new security system and engage it for the next six month during which they will observe the number of attempted hacking without success in the main system. It is at this time that it will prove inevitable to avoid. Abstract The need to prevent hackers from succeeding in their quest is one of the investments being done by most of the organizations. Organizations do invest in various systems that will ensure that their insider information is not leaked to the unauthorized persons or that the unknown does not manipulate the organization’s data. Various systems have therefore been floated in response to the conduct. The lingering question is the viability of the system employed to succeed in the intended purpose, we made a proposal to your organization in this regard where we intended to implement the Honeynet project. Research was done about this project in terms of how successful it is and the informati on collected is