Free Essay

Is Cyber Crime a Serious and Growing Threat?

In:

Submitted By CaptainTed
Words 2796
Pages 12
Is Cyber crime a serious and growing threat?
1. INTRODUCTION
Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism.

2. CATEGORIES OF CYBER CRIME
Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also gives a clue of the different aspects of a country which are usually targeted. Furthermore, each of the four categories is sub-divided into distinct labels according to the variety of methods used to perpetrate the crime. Invariably, all the techniques used are purportedly devised to directly or indirectly inflict harm to the victims or targets by causing monetary losses, harassment, security breaches and privacy intrusions. The following is some examples of the methods used in relation to each category: 1. Individuals: cyber stalking, email spoofing and spamming; 2. Property: credit card fraud, intellectual property crimes; 3. Organisations: denial of service, salami attack and Trojan horse; and 4. Society: forgery and cyber terrorism.
3. CORRELATION WITH THE INTERNET EXPANSION
There is significant positive correlation between the expansion of the Internet and the frequency of cyber crime. This stands to logic as the pool of potential victims to cyber attacks enlarges as the number of Internet users increases. In like manner, advances in Internet technology (e.g. social networking) pave the way for more online opportunities to cyber attacks. However, it should be emphasized that correlation in this contest does not imply causation. True it is that cyber threats have evolved in line with the Internet but the Internet proper is not to be blamed as the true cause of these unlawful acts and doings are merely the bad intent of some criminally minded persons.

4. CYBER CRIME IN MAURITIUS
Cyber crime is a worldwide occurrence extending to cross borders wherever the Internet facility is available. And having regard to the prevalence of information technology in Mauritius, it is not surprising to note that cyber crime has already weaved its web here. At the end of the year 2013, the number of Internet subscribers, over a then population of 1,259,838, reached the figure of 680,800. Given the trends, it can reliably be foreseen that the importance of the Internet in the daily life of the Mauritians will continue to amplify in future (Mauritius ICT Indicators Portal 2013). Figures 1 and 2 below show the yearly increase in the number of Internet subscribers and percentage of businesses with the Internet/email respectively in Mauritius (National Computer Board 2013).

Fig. 1. Total Internet Subscriptions in Mauritius from 2009 to 2013

Fig. 2. Percentage of businesses in Mauritius with internet/email from 2006 to 2012

In fact, about 1,295 cyber crime incidents have been recorded from 2008 (Bignoux 2013). Being aware of the implications of this growing threat, the Hon. Tassarajen Pillay Chedumbrum (2014), Minister of Information and Communication Technology, in his speech on cyber security at a conference in Ebene stated: The stakeholders of our economy are increasingly worried about cybercrime and …cybercrime makes our citizens less likely to shop online. In essence, the digital economy falls short of its potential.

5. INCIDENTS AND FINANCIAL LOSSES CONTINUE TO RISE
Such concern for cyber threat is also felt by the other national states as not only have the cyber crime incidents grown in frequency, but its resulting financial repercussions on the global economy are reportedly quite damaging. According to a latest report conducted by the Centre for Strategic and International Studies (CSIS), it is estimated that cyber crime currently costs the world economy about $445 billion yearly. The report also indicates that the cyber criminal activities are believed to have affected over 800 million people worldwide in 2013 (Huang 2014). Moreover, it has also been observed that the average dollar loss per cyber complaint in the United States of America continues to mount (IC3 2013). The hypothesis put forward to explain this particular upward trend is that there is a tendency for a gradual shift from random to targeted attacks by big cyber crime organisations which are often financed and headed by traditional criminal syndicates. Hence, this adds a new dimension to cyber crime, which lends support to the contention that cyber crime is indeed a major threat that is likely to escalate.

6. ARE THE CYBER LOSS ESTIMATES EXAGGERATED?
One may argue that the estimates used to quantify monetary losses due to cyber crime are massively exaggerated. The skeptics usually advance that not only the figures are based on bad statistical methods but even if the right methodologies are applied, errors are amplified when the survey group is scaled to the overall population. On the other hand, the advocates of these figures contend that, on the contrary, the amounts tend to be below the real total losses. They explain that it is a routine for many large companies like the banks and other financial institutions to try and conceal their losses sustained, which are typically significant. They usually do so in order to avoid bad publicity and loss of customer trust. Moreover, the reasonableness of these estimates can be tested against the official figures revealed in the case of the file sharing site MegaUpload which was closed down by the American Courts in 2012. The loss sustained by the American companies, basing on the market value of the files illegally hosted, was to the tune of 500 million dollars (Newjestic 2012). One should bear in mind that copyright infringement is only one of the many branches of cyber crime and MegaUpload is only one among thousands of illegal file sharing sites (though MegaUpload is concededly one of the major sites). This single instance clearly denotes that the overall summing-up estimate of the multitude of financial loss incidents is not inflated out of proportion. And this a fortiori lends colour to the contention that cyber crime is a serious concern.

7. SECURITY ISSUES
The impact of cyber crime is not only limited to monetary losses but also extends to pose serious security issues, all the more so that computers in our contemporary society are instrumental in the delivery of essential services. Such kinds of cyber attacks are reported to be perpetrated by highly skilled and oftentimes state-sponsored hackers using advanced techniques called Advanced Persistent Threat (APT) attacks. They tend to aim at government-related infrastructure, or the industrial sector (Nachreiner 2012). This emerging and evolving type of cyber attack is viewed with very much concern by various states. In the year 2007, for instance, the Pentagon computer networks were hacked by attackers located in China. This makes sense when in January 2014, the US Director of National Intelligence – Mr. James Clapper, has ranked cyber crime as the top national security threat (Clapper 2014).

8. DETRIMENTAL EFFECT ON THE BUSINESS SECTOR
It is reported that cyber intruders have increasingly targeted information about high-stakes business deals like high-value corporate mergers and negotiations as these insider dealing activities may earn them considerable gains. On the other hand, this may prove devastating for the target organisations. In 2009, hackers gained access to sensitive corporate files from the computer system of Coca Cola Co. (KO) about its attempted $2.4 billion acquisition of China Huiyuan Juice Group (Elgin et al. 2014). Shortly after, the deal for the takeover collapsed. A Chinese businesswoman made a gain of HK$ 21.15 million upon acting on this insider information was prosecuted and fined (Yiu 2014). However, the cyber intruders were never brought to Court though the FBI probed into the matter.

9. ANONYMOUS MODE OF OPERATION
What makes cyber criminals more pernicious is that they rarely get caught and continue to operate in sheer impunity. In effect, it is difficult to investigate the identity of the culprits as they not only hide themselves behind the domain name but given that their physical presence is not required for the commission of the act, they can be anywhere in the world. Besides, they have high information technology skills and will take great care not to leave any digital clues, which may bring the investigators to them. Indeed, electronic trail is very difficult to follow. Furthermore, their arrest and prosecution oftentimes entail jurisdictional issues. Even if the suspects are uncovered, the investigators need to have the necessary skills to gather the relevant digital evidence to establish the elements of the offence so as to be able to prove the charges before the competent Courts.
10. LEGAL COUNTERMEASURES
With a view to mitigate or eradicate the dire threats of cyber crime, nearly all governments have passed new statutory laws. In Mauritius, specific legislation on cyber crime has been enacted, namely: The Electronic Transaction Act 2000, ICT Act 2001, Computer Misuse and Cyber Crime Act 2003, and The Data Protection Act 2004 (Cyberwellness profile Mauritius 2012). Accredited international courses are being provided to the local cyber crime units to improve their effectiveness to investigate and prosecute (Embassy of the United States 2011). Given that cyber criminals operate internationally and that there are jurisdictional and enforcement issues, the Budapest Convention has been set up at the international level to address these problems. Its aims include, inter alia, the promotion of international cooperation, harmonisation of domestic laws and improving investigative techniques (Wikipedia 2014).

11. RECOMMENDATIONS
The primary responsibility for individuals and organisations for securing their computers against cyber assailants rests with them. Apart from the legal measures, technical countermeasures should be proactively taken. For instance, the individual users may insert a firewall, use good antivirus software and select strong passwords that will be difficult to guess, etc. The organisations may identify the requirements for effective cyber security and consider using the multi-layer security approach to guard against advanced hacking techniques. They can also subscribe to a cyber crime insurance cover to shift the financial consequences of an eventual cyber attack on the insurer. Cross borders’ cooperation should continue to strengthen cyber laws and the international community should exercise some pressure on those countries where online piracy is still legal to prohibit the websites concerned to operate.

12. CONCLUSIONS
Empirical facts show that cyber crime has increased to such a point that, though totally remote, it is nearly omnipresent online. Its various methods of operation are not only furtive but may be very harmful, especially in terms of monetary loss and the consequences of high-profile security breaches. Both legal and technical countermeasures are being taken by the various stakeholders concerned to protect themselves from the dangers of falling victims of this technological flaw. Besides, coordinated international efforts are being made to render the combat against cyber threats more effective. However, given the continuing upward trend, it would seem that the authorities are still not in a position to exercise adequate control on cyber crime. Will cyber crime continue to be unabated? Only time will tell. However, to the question as to whether cyber crime is growing and serious, the immediate reply cannot be otherwise than to the affirmative.

Number of words: 1,984

13. BIBLIOGRAPHY

Bignoux, L.,2013. Mauritius steps up battle against rising cyber crime. Africareview.com [online], Available from: http://www.africareview.com/News/Mauritius-steps-up-battle-against-rising-cyber-crime/-/979180/1895366/-/h6ela3z/-/index.html [Accessed on 17 Sep. 2014].

Chedumbrum, T.P, (Minister of Information and Communication Technology) 2014. Strategy and Action Plan. In: Validation Workshop on National Cyber Security, 24 March 2014 Ebene, Reduit. [online]. Available from: http://mict.gov.mu/English/Documents/Opening%20address%20by%20Minister%20for%20Validation%20Workhsop%20in%20Cyber%20Security%20Strategy%20edited%20dkb.pdf [Accessed 21 Sept. 2014].

Clapper, J., 2014. Worldwide Threat Assessment of the US Intelligence community. Council on Foreign Relations [online]. Available from: http://www.cfr.org/intelligence/worldwide-threat-assessment-us-intelligence-community/p30228 [Accessed 24 Sept. 2014].

Cyberwellness profile Mauritius,2012. United Nations, Statistics Division [ online]. Available from : http://www.itu.int/en/ITU-/Cybersecurity/Documents/Country_Profiles/Mauritius.pdf [Accessed 23 Sept. 2014].

Dubey, R., 2004. India: Cyber Crimes “an unlawful act where in the computer is either a tool or a target or both”. Mondaq [online]. Available from: http://www.mondaq.com/india/x/28603/technology/Cyber+Crimes+an+unlawful+act+where+in+the+computer+is+either+a+tool+or+a+target+or+both [Accessed 21 Sept. 2014].

Elgin, B., Lawrence, D. and Riley, M., 2014. Coke gets hacked and doesn’t tell anyone. Bloomberg [online]. Available from: http://www.bloomberg.com/news/2012-11-04/coke-hacked-and-doesn-t-tell.html [Accessed 20 Sept. 2014].
Embassy of the United States, 2011. Equipment Grant to the Mauritius Police Force. The US Department of States [online]. Available from: http://mauritius.usembassy.gov/pr20111005_equipment_grant_police_force.html [Accessed 23 Sept. 2014]

Huang, N., 2014. Cyber Crime causes $445 Billion Loss Annually in Global Economy. Business Vibes [online]. Available from: http://www.businessvibes.com/blog/cyber-crime-causes-445-billion-loss-annually-global-economy [Accessed 24 Sept. 2014].

Internet Crime Complaint Centre (IC3), 2013 Internet Crime Report. The Federal Bureau of Investigation [online]. Available from: http://www.ic3.gov/media/annualreport/2013_ic3report.pdf [Accessed 21 September 2014]

Mali, P., 2009. Classification of Cybercrimes. LAWYERSCLUBINDIA[online]. Available from: http://www.lawyersclubindia.com/articles/Classification-Of-CyberCrimes--1484.asp#.VBvCA5SSxb2 [Accessed 22 Sept. 2014].

Nachreiner, C. 2012. Don’t Be a Target – Anticipate and Monitor for APT Activity.
WatchGuard Security Center [online]. Available from: http://watchguardsecuritycenter.com/2012/11/14/dont-be-a-target-anticipate-and-monitor-for-apt-activity/ [Accessed 20 Sept. 2014].

National Computer Board, 2013. Percentage of businesses with internet/email. Mauritius ICT Indicators Portal [online]. Available from: http://www.gov.mu/portal/sites/indicators/ICT_Business/Business_Internetmail.html National Computer Board, 2013. Total Internet Subscriptions. Mauritius ICT Indicators Portal [online]. Available from: http://www.gov.mu/portal/sites/indicators/index.html [Accessed 23 Sept.2014].

Newjestic, 2012. MegaUpload closed by the US courts and the FBI! [online]. Available from: http://newjestic.com/news/megaupload-closed-by-the-us-courts-and-the-fbi/ [Accessed 19 Sept. 2014].

Online Dictionary 2014, Oxford Dictionaries. Available from : http://www.oxforddictionaries.com/definition/english/threat [Accessed 22 Sept. 2014]
Ponemon Institute, 2013. 2013 Fourth Annual Cost of Cyber Crime Study: Global. HP Enterprise Security [online]. Available from: www.hpenterprisesecurity.com/ponemon-study-2013 [Accessed 14 September 2014]

Wikipedia The Free Encyclopedia, 2014. Convention on Cyber Crime. Available from: http://en.wikipedia.org/wiki/Convention_on_Cybercrime [Accessed 24 Sept. 2014]
Wilson, C, 2014. 15-year-old admits hacking NASA. ABC News [online]. Available from: http://abcnews.go.com/Technology/story?id=119423 [Accessed 19 Sept. 2014].

Yiu, E, 2014. Businesswoman fined HK$24m for insider trading. South China Morning Post [online]. Available from: http://www.scmp.com/business/companies/article/1235030/businesswoman-fined-hk24m-insider-trading [Accessed 21 Sept. 2014].

FURTHER READING:

AccessData Group, (2013). Cyber crime trends, challenges and countermeasures [online]. Available from : http://www.gov.mu/portal/sites/cert/Targeted%20Attacks%20and%20Mitigation%20Workshop/Presentations/ADFile%202.pdf [Accessed 17 Sep. 2014].
Bogursky, S. and Kaplan, J.A., 2013. Multiple NASA Websites hacked. Fox News [online]. Available from: http://www.foxnews.com/tech/2013/09/12/multiple-nasa-websites-hacked/ [Accessed 18 Sept 2014].

Boswell, W. 2014. The World Wide Web. about technology[online]. Available from: http://websearch.about.com/od/whatistheinternet/a/usewww.htm [Accessed 23 Sept. 2014].
Goodin, D., 2012. Stuxnet worm reportedly planted by Iranian double agent using memory stick. Arstechnica [online]. Available from: http://arstechnica.com/business/2012/04/stuxnet-worm-reportedly-planted-by-iranian-double-agent-using-memory-stick/ [Accessed 23 Sept. 2014].

Kharouni, L. 2013. Africa A New Safe Harbor for Cybercriminals? Trend Micro Incorporated Research Paper [online]. Available from: http://www.trendmicro.de/media/misc/africa-new-safe-harbor-for-cybercriminals-en.pdf [Accessed 17 Sep. 2014].

Similar Documents

Premium Essay

Cyber Security

...Cyber security is a critical and growing issue in the world today. President Obama said this issue is, "one of the most serious economic and national security threats our nation faces" (Cybersecurity). The United States is one of the most computer dependent societies and has the most computer dependent military and intelligence agencies. With more and, more of our country being ran by technology we are at a bigger risk of attack. A cyber attack could be the most devastating attack our country has ever faced. An attack on America’s cyber infrastructure could cripple the country and put us at an even greater risk of a normal attack. FBI Director said “Counterterrorism — stopping terrorist attacks — with the FBI is the present number one priority. But down the road, the cyber threat, which cuts across all FBI programs, will be the number one threat to the country” (Paganini). The message is clear the cyber security threat we are facing today is a dangerous and growing threat that has serious offensive potential and is often difficult to detect or prevent. An attack on a nation’s critical infrastructure can be devastating and when you add the fact that cyber attacks often do not make themselves know until it is to late could make for a devastating first strike prior to an invasion. Cyber security is defined as measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack. The term “cyber security threat” means...

Words: 2041 - Pages: 9

Premium Essay

Essay On Cybercrime

...Introduction Crime is a popular issue that we always heard in this globalization era. It refers to any violation of law or the commission of an act forbidden by law. It can contribute to negative impact in term of social and economic development. Nowadays, there are a lot of crimes which increase around the world; United Arab Emirates is one of the countries at risk of these issues. One of these types is the cybercrime as; people want to keep up with technology and modern life. This matter in increase day by day as every day we hear from the news, newspaper and social media, there's a huge number of people who are victims cybercrime. Brenner (2010) in Cybercrime: Criminal Threats from Cyberspace book state, this type of crimes found in 21-century after the development and globalization because people used technology, but they don't have enough information and not aware about this issue. In addition, Cybercrime is the type of criminal crime which is punishable by law and it means that Using technology resources. Such as, the internet for committing serious crimes such as, deception, fraud, theft, copyright violations and extortion through online stalking, harassment, defamation, and invasion of privacy. Moreover, The cybercrime divided into three divisions, the first division is crimes...

Words: 1569 - Pages: 7

Premium Essay

Cyber Crimes

...Cyber Crimes Cyber crimes are on some of the hardest crimes for the police to stop and catch the perpetrators because they can commit a crime in one state or country and physically be in another state or country. While the invention of the Internet has had great affects on the growth of technology, it has also given criminals an extremely large place to hide in and the laws are still trying to catch up with the growth of technology. The different technology crimes that occur fall into one of the three following categories: cyber piracy, cyber trespass, and cyber vandalism, and like the original crimes of piracy, trespass, and vandalism these crimes are similar except they happen in digital form. Three Categories of Cybercrime There are three categories of cybercrimes that can cause a lot of trouble for any individual or organization who becomes a victim of these crimes. Cyber piracy, trespass, and vandalism in some ways are similar because they all involve taking advantage of individual people or organizations by stealing personal information through digital techniques. 1. Cyber piracy Cyber piracy has two definitions; the first definition is when a person uses cyber technology unlawfully to produce copies of proprietary information. While the second definition is when a person uses cyber technology to distribute proprietary information, while it is in digital form, across networks. 2. Cyber trespass Cyber trespass has two definitions as well. The first definition...

Words: 819 - Pages: 4

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Free Essay

Crime Theories

...The fast growth of technology is creating more and more threats to our society in a number of ways. It is threatening individuals by letting cybercriminals gain access to sensitive information that can cause harm to innocent people. It is also creating threats to our younger generations that are unable to cope with the high emotions of social media sites. Individuals are being lured by fake profiles or fake people who would do harm to them. Computer crimes are on the rise. Law enforcements and agencies are doing everything they can to prevent the spread of these crimes. They have created special task divisions to protect our society better. New laws have been put to place to protect U.S citizens better. The four categories of crime: the computer as a target, the computer as an instrument, the computer as incidental to a crime, and crimes associated with prevalence of computer show that everyone can fall victim to some cybercrime. The computer as a target The computer as a target in cybercrime is what today’s society fears. Examples that are considered the computer being a target are denial of service attack, data alteration, and intrusion. Denial of service is when cyber criminals deny users to access to a machine or network. An example of this is when Yahoo was hacked into, and users could not open the website for a couple of hours until Yahoo had fixed the issue. Yahoo’s denial of service attack is a great example because it showed society that even big names...

Words: 2182 - Pages: 9

Premium Essay

Cybercrime

...personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi.com). According to the Cyber snitch Voluntary Online Crime Reporting System, the most reported Internet related crime is child pornography, with other crimes ranging from desktop forgery to such potentially violent crimes as electronic stalking and terrorist threats. (Cybersnitch Web Site). (Mitnick & Simon, 2002)...

Words: 2360 - Pages: 10

Free Essay

Cybercrime

...Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center Introduction The capabilities and opportunities provided by the Internet have transformed many legitimate business activities, augmenting the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. Criminals have also discovered that the Internet can provide new opportunities and multiplier benefits for illicit business. The dark side of the Internet involves not only fraud and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of disruption that is the focus of the intruder community. In the virtual world, as in the real world, most criminal activities are initiated by individuals or small groups and can best be understood as “disorganized crime.” Yet there is growing evidence that organized crime groups or mafias are exploiting the new opportunities offered by the Internet. Organized crime and cyber-crime will never be synonymous – most organized crime will continue to operate in the real world rather than the cyber-world and most cyber-crime will continue to be the result of individuals rather than criminal organizations per se. Nevertheless, the degree of overlap between the two phenomena is likely to increase considerably in the next few years. This is something that needs to be recognized by business...

Words: 3403 - Pages: 14

Premium Essay

The Effect of Cyber-Crime and One Way to Fight Back

...The effect of cyber-crime and one way to fight back Travis Major Lynn University Jeanette Francis 08 June 2013 The cost of cybercrime to businesses For three years now cybercrime has continued to grow. During this time cyber-attacks have more than doubled, while hitting the financial side with an estimated 40 percent increase. The cost of cybercrime study in 2012, conducted by Ponemon Institute, found that cybercrime costs to a random sample of organizations averaged 8.9 million dollars. This spike is estimated to have increased the cost of cybercrime by 6 percent from 2011 and 38 percent from 2010. Also during this study it was discovered that there had been a huge increase of cyber-attacks, approximately 48 percent, with around 102 of them being successful per week. The number of successful attacks per week in 2010 was only around 50. More than 78 percent of the annual cybercrime can be labeled as denial of service, malicious code, malevolent insiders, and stolen or hijacked devices. Businesses have no choice but to spend an increasing amount of money, time, and energy in order to protect themselves against these cyber-attacks that seem to be reaching unsustainable levels. Even though some companies are finding ways to lower the cost of security measures, the cost of time and energy spent cannot be eased. No matter what the solution is, it will always take time to incorporate any security and energy to maintain those securities. Additional key findings include: ...

Words: 1928 - Pages: 8

Premium Essay

Cyberthreats

...Cyber threats Randi Titzer BCC/403 April 10, 2016 Bobby “Robin” Kemp Cyber Threats A cyber threat is a possibility that a malicious attempt has been made to damage or disrupt a computer network or system. Cyber threats happen all over the world to all people. It doesn’t matter your race, religion, national origin, ethnicity, gender or sexual orientation. Cyber threats can be in various forms, such as what we will be discussing later on in the readings. We will discuss hacking of financial institutions, security issues, downloads/applications, etc. Each of these have serious consequences and can cause harm to the businesses and members of these businesses and/or owners of these accounts. Identify cyber-related threats that emerged from existing global technology There are several types of cyber threats that have emerged from existing global technology. Some of these threats that I will discuss have not only had past effects on society as a whole, but they will also have some severe future effects on society too. The first threat that we are going to discuss is the security issues occurring with mobile devices, computers, etc. One example of this is the issue with the FBI and Apple. The FBI couldn’t get into an Apple iPhone of a supposed terrorist because the phone was encrypted. Apple would not help the FBI gain access to the iPhone and this is...

Words: 729 - Pages: 3

Premium Essay

Cyber Terrorism

...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...

Words: 4562 - Pages: 19

Premium Essay

Cyber Crime

............................................................................................. 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3 4.1. The major risks of cyber security ................................................................................................. 3 4.1.1. To consumers ........................................................................................................................ 3 4.1.2. To businesses........................................................................................................................ 4 4.1.3. IT organisations ..................................................................................................................... 4 4.1.4. Telecommunication companies ............................................................................................. 5 4.1.5. Government ........................................................................................................................... 5 4.2. The origin of cyber security ............................................................................................

Words: 3380 - Pages: 14

Free Essay

Cyber Crime in Bangladesh

...INTRODUCTION 1.1 Definition of Cyber Crime The internet in Bangladesh is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. “The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb”. The term ‘cyber crime’ has been evolved from two words ‘cyber’ and ‘crime’. ‘Crime’ is more or less known to each individual on his own stand point, while ‘cyber’ is almost vague in meaning to the same. So if any time anybody uses the prefix ‘cyber’, we simply mean, he is talking about something is doing online or there has certain networking system. Actually anything related to Internet falls under the cyber category. Computer crime or cyber crime is a form of crime where the Internet or computers are used as a medium to commit crime. Issues surrounding this type of crime have become high-profile, particularly...

Words: 14728 - Pages: 59

Free Essay

Change Managment

...Cyber Terrorism Mahesh kanneboina Wilmington University Abstract The Internet is the global connection of interconnected computer networks where information can be shared among users around the world. But these days the Internet is not secure as the fundamental mechanics of the Internet are well known to many people and leading to long-standing security issues caused by the bad people who could build a “cyber nuke” to take down the network. This paper discusses about the cyber terrorism where a hacker or terrorist attacks the confidential websites of the nation and gets the important information for their activities. This cyber terrorism came into light after the 9/11 attack on WTC and from then the media focused its attention on Cyber security that has reflected public policy concerns worldwide about this topic. Security of Internet and BGP The Internet is where every network is able to reach every other network. According to industry analysts, there are 794 million people online world-wide and it is expected to be more in the coming years. This represents a lot of data interchange. But many small businesses, and even large organizations, do not know how to protect their sensitive data, thus making it easy for criminals. Online Security is a growing concern for governments around the world. Border Gateway Protocol (BGP) is the protocol which makes core routing decisions on the Internet, but unfortunately, BGP is not secure because some network administrator...

Words: 2007 - Pages: 9

Premium Essay

Essay On Cyber Terrorism

...Rising Cyber Terrorism and Role of Law in India Abstract: This paper makes an attempt to realize how cyber-crime and the measures to contain it are implemented in India. With the rise of global terrorism, terrorists are more inclined to use the vast internet for their nefarious activities. Something that they can accomplish without them physically being present and having the assurance of not being caught has promoted this form of terrorism all the more. In this paper an attempt has been made to understand cyber-terrorism, its various facets and also the laws and legislations in our country that inhibit such acts of terror. Introduction: The separation between the real world and virtual world is vanishing. The dependence of life on computers has increased high level. This dependency is used by the terrorists to their advantage by the use of internet. There are several types of cyber-crimes, such as Cyber Theft, Cyber Trespass, Cyber Stalking, Cyber Pornography, Cyber laundering, Cyber Theft, Cyber Vandalism and Cyber Terrorism, but the most threatening and dangerous are ones the that come under the category of the term cyber terrorism. Techno legal experts of India have been warning against growing incidences of cyber-attacks, cyber-crimes, cyber espionages, etc....

Words: 2882 - Pages: 12

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...

Words: 2411 - Pages: 10