Equifax has given a record data that interpreted as almost 143 million customers were target of theft.

Equifax has given a record data that interpreted as almost 143 million customers were target of theft.  One of the other consumers organization has reported that these kind of online frauds and cyber crimes are not just affecting people’s money, but it is also a big threat to the organizations and their private information. Donald Trump enacted an executive order 13800 (82 Federal Regulation 22391), with the tile and statement of “Strengthening the Cybersecurity of Federal Networks and Infrastructure”. It was enacted with interest of safety and awareness about cybercrimes. He appointed a positional secretary of various state to imply these implications on a practical basis. Furthermore, he added that the United Sates is in collaboration with worldwide secure and reliable network (Internet). And this agenda must maintain their integrity. In order to do that there should be a protocols and policies (Shows legitimate boundaries) which should be feasible, affordable and easy to implicate. The purpose of developing regulations is not just limited to the developing security, but it also enhances the quality by maintaining its prosperity, limiting frauds and provide enough restrictions against disruption and theft (Broadhurst, R. 2006).

Having all the components, it is still bit difficult to make those implications. But it is not impossible.  Computer forensic has been revolving over the years which has brought enormous changes and has kept this process at ease.  Judicial issues are still one of the thoughtful questions which make these all commands bit more difficult but with the cooperation of people, country and government it is possible (Kao, D.-Y., & Wang, S.-J. 2009).


Broadhurst, R. (2006). Developments in the Global Law Enforcement of Cyber-Crime. Policing: An International Journal of Police Strategies and Management, (Issue 3), 408.

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=edshol&AN=edshol.hein.journals.polic29.37

Kao, D.-Y., & Wang, S.-J. (2009). The IP Address and Time in Cyber-Crime Investigation. Policing: An International Journal of Police Strategies & Management, (Issue 2), 194.

Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=sso&db=edshol&AN=edshol.hein.journals.polic32.21


Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *