Verified Document

Cyber Crime Is A Serious Term Paper

" The use of stepping stones can make it difficult for law enforcement to find where an attack actually originated. As was previously mentioned in this discussion, Hackers are often used by companies to develop stronger security. Hackers often perfect their techniques at conventions that also feature hacking competitions. The competitions are usually sponsored by large organizations and challenge the Hackers to see if they can break the companies programming codes or hack into their systems. According to an article found in the Yale Law Journal

The contests are popular among hackers. One contest...logged almost 20,000 attacks. The companies carefully tailor their competitions to the participants' motivations. More than a passing fad, competitions are increasingly prevalent, and some of them are annual affairs. Companies continue to put contests to new uses. Early last year, the search engine Google announced a programming contest to develop software, and Microsoft challenged hackers in order to test its software's security (Wible, pg.1557)."

In addition to "professional" hackers, there is also a great deal of readily available software and hacking instructions available on the internet. This means that the developing of hacking techniques is no longer necessary. People with absolutely no experience as hackers can cause a great deal of harm to individual users and organizations.

Current legislation

For many years legislators have attempted to introduce laws that will deter and harshly punish cyber criminals. According to the American Criminal Law Review

In 2003, the White House released its National Strategy to Secure Cyberspace. In 2004, the United States Department of Justice Task Force on Intellectual Property issued its Report, and detailed the Justice Department's roadmap for combating crimes involving trade secrets and other intellectual property often stolen or distributed over computer networks. The Federal Bureau of Investigation has made cyber-crime a top priority. More recently, the House of Representatives passed a resolution acknowledging the "increasing threat of malicious attacks" through computer intrusions. Congress also enacted the Family Entertainment and Copyright Act of 2005, which made it a felony to use a computer to upload previously unreleased movies, games and software onto the Internet (Wang & Hoffstadt, pg 201).

The author also explains that that congress has considered and passed legislation that would make it against the law to use a computer to acquire personal information including social security numbers or credit card information (Wang & Hoffstadt). Congress has also considered legislation that would make it a crime to install software on a computer with the intent to engage in criminal activity (Wang & Hoffstadt).

It is evident that legislators are taking cyber crime very seriously. Legislators understanding the significant cost associated with maintain secure computer systems and networks. Legislators also understand that serious computer breaches can rattle consumer confidence and destroy businesses and...

The increased reliance on technology for such things as shopping and paying bills, increases the probability the cyber crimes will continue to increase. It is evident that cyber criminals are aware of the security measures that have been taken and they have found ways to circumvent many of these measures. Because this is the case cyber criminals are often one step ahead of law enforcement agents.
In the future, businesses and organizations will have to be savvier about the manner in which they approach security. In addition they will have to be more vigilant about who has access to a network. Many cyber crimes occur at the hands of employees and employers must be more aware of this reality.

Conclusion

The purpose of this discussion was to investigate various aspects of cyber crime. The research found that cyber crime is growing in prevalence and severity. The research also indicates that Law enforcement has experienced some success in tracking down perpetrators but failure in getting them convicted of a crime. The investigation also asserted there are several investigative elements that can be used to find cyber criminals including forensic analysis.

It is also evident from the research that Cyber security is costly and accounts for at least 10% of most it budgets. The research also suggests that Hacking is a sport in which stepping stones are a fundamental technique. In attempts to combat cyber crime, several legislative steps have been taken and congress seems to be aware of the serious nature of cyber crimes.

Lastly, it is very probable that cyber crimes are going to be prevalent well into the future

References

Andress, Amanda. Surviving Security: How to Integrate People, Process, and Technology. Boca Raton, FL: Auerbach Publications, 2003

Brenner, Susan W. "At Light Speed": Attribution and Response to Cybercrime/terrorism/warfare." Journal of Criminal Law and Criminology 97.2 (2007): 379+.

Landler). Mark. A Filipino Linked to 'Love Bug' Talks About His License to Hack. New York Times. October 21, 2000

Green, Kate Catching Cyber Criminals. March 14, 2006. 3 May 2008

http://www.crime-research.org/interviews/Catching-Cyber-Criminals/

Lang, Dave. "Dos and Don'ts for Digital Evidence: Managers Need to Understand the Basics of Digital Investigations So That They Can Respond to Cybercrime without Committing a Crime Themselves." Security Management June 2005: 55+.

Waxer, Cindy. Hidden Costs of it Security. 3 May 2008 http://www.networksecurityjournal.com/features/hidden-cost-of-it-security-041607/

Wible, Brent. "A Site Where Hackers Are Welcome: Using Hack-in Contests to Shape Preferences and Deter Computer Crime." Yale Law Journal 112.6 (2003): 1577+.

Yang, Debra Wong, and Brian M. Hoffstadt. "Countering the Cyber-Crime Threat." American Criminal Law Review 43.2 (2006): 201+.

Sources used in this document:
references and Deter Computer Crime." Yale Law Journal 112.6 (2003): 1577+.

Yang, Debra Wong, and Brian M. Hoffstadt. "Countering the Cyber-Crime Threat." American Criminal Law Review 43.2 (2006): 201+.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cybercrime Modern Scam: A Summary of the
Words: 1182 Length: 4 Document Type: Article Review

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Cybercrime What's in a Name
Words: 2690 Length: 9 Document Type: Term Paper

In this scenario, "if a bad guy wants to take over an account, he'll have someone else speak in a different language in a different location, and that's all they do. Their expertise is calling financial institutions for social engineering" (Piazza 2006). According to Piazza (2006), cybercrime consists of any crime a person commits by using a computer or computer technology. He classifies various types of cybercrime into four

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Cybercrime Is a Term That Is Used
Words: 672 Length: 2 Document Type: Essay

Cybercrime is a term that is used to refer to criminal activities involving the use of computers or computer networks as tools, target, or places of criminal offenses. This type of crime incorporates electronic cracking, denial of service attacks, and traditional offenses where computers and computer networks are used for conducting illegal and illicit activities. Throughout the world, cybercrime has been reported as amongst the most significant and widely used

Cyber Crime Forensics
Words: 2623 Length: 9 Document Type: Term Paper

Cybercrime has become a serious problem in the world we live in. The abundance of personal computers that are readily available at relatively low prices has spawned the growth in Cybercrime all over the globe. As a result, law enforcement agencies have developed cybercrime forensics which is designed to track down those that are responsible for cyber crimes. The purpose of this discussion is to analyze this subject and discuss

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now