Review the Federal Bureau of Investigation’s Cyber’s Most Wanted website. Select one suspect and explain the related security laws, crimes committed, security vulnerabilities that were exploited, and how to prevent these incidents from happening again.
Specifically, the following critical elements must be addressed:
Explain the related security laws based upon the chosen suspect.
Describe the crimes committed by the chosen suspect.
Identify the security vulnerabilities that were exploited.
Propose incident precautions in order to prevent the incident from repeating.
Chosen suspect: Igor Dekhtyarchuk
Security laws
The following security laws are relevant to the crimes committed by Igor Dekhtyarchuk:
Crimes committed
Igor Dekhtyarchuk is accused of operating a cyber-criminal marketplace that sold thousands of login credentials, personally identifiable information (PII), and authentication tools that allowed transnational organized crime and other cyber criminals to unlawfully access the online accounts of victims located around the world.
Security vulnerabilities exploited
Dekhtyarchuk exploited a variety of security vulnerabilities, including:
Incident precautions
There are a number of things that organizations and individuals can do to prevent incidents like the one committed by Igor Dekhtyarchuk:
Specific recommendations
In addition to the general incident precautions listed above, there are a number of specific recommendations that organizations and individuals can follow to protect themselves from the types of attacks that Dekhtyarchuk is accused of carrying out:
By following these recommendations, organizations and individuals can help to protect themselves from the types of attacks that Dekhtyarchuk is accused of carrying out.