ABSTRACT

Law enforcement agencies, such as Interpol and the Federal Bureau of Investigation (FBI) (Figure 6.1) (Broadhurst, 2006), are stepping up eorts to preempt this technologybased crime. Nonetheless, more and more people and organizations become victims of hacking, the, identity the, and malicious soware. e leakage of cozy photos owned by celebrities is a typical case. e solid way to avoid being a cybercrime target is to protect sensitive information oine and in the cloud. Impenetrable security built on a unied system composed of soware, hardware, and security policy can authenticate information traversing over the Internet.