Verified Document

Cybercrime Cyber Theft Is A Term Paper

Think of a bank or mortgage company who is hacked, and the amount of personal data that can be downloaded and used elsewhere ("Cyber Investigations"). In addition, many hackers come into governmental or business computers and crash those servers, place viruses, bots, Trojans, email bombs, etc. -- or mine the data or manipulate the data -- where for competitive advantage or simply "as a prank," this is all part of this genre of serious Cybercrime (Wall, 2007). Because of this plethora of cybercrime, Federal, State, and Local agencies continue to try to curtail the efforts of these criminals. Private corporations continually change their software and security protocol, but it is taking a great deal more complex codes to keep Cybercriminals out (Moreau, 2006). Most States, in fact, have their own Cybercrime units, most especially (at the State and Local level) to act in a more tactical manner. Because of the nature of Cybercrime in generally, though, it is typically the FBI, CIA and other Federal agencies that focus on this, and interface with Interpol and other national agencies in other countries ("Articles on Cybercrime"). Cyber terrorists, for example, can hit banks, credit card companies, clearing houses, or major corporations and disrupt the economy of an entire nation with the touch of a button. In fact, much like the NSA example, the problem is so vastly complex that it is almost impossible for any foreign policy expert to comprehend. Thus, for many, the more basic and simple scenario -- the detonation of a Weapon of Mass Destruction in a public venue, remains the top priority. However, sad though it may be, the pragmatic terrorist threat is actually embedded within this complex and seemingly endless network of global sympathizers, high-level financiers, and state sponsored covert foreign policy (Wirtz, 2006).

What can be done about Cybercrime? As much as the government or other law enforcement agencies try, they cannot seem to keep up with the trend. If one thinks about it, all a Cybercriminal needs is an internet connection and a computer, anywhere in the world -- then it is up to their own intellect and motivation (Cain, 2003). The personal user can try to prevent crime as much as possible by changing passwords, but the individual likewise cannot change their social security or birth date at whim ("Cybercrime Articles"). They can be certain they never give out information without the company or agency having appropriate security software installed, but even then, data mining, viruses, and traps exist all the time -- even if not for gain, making life complicated and computer use irritating for some (Hallam, 2008).

The Internet has, unarguably, changed the way that the world communicates, purchases, researches, and interacts. Along with this change, though, comes issues that focus on security for both the private and corporate individual. Why is this security so necessary, one might ask -- how can others have access to internal electronic data and measures, and what is the clear issue regarding these issues? The simple answer is termed "cyber theft," and is the reason it is necessary to expand the security for information technology. Cyber theft is a major criminal issue surrounding the use of the Internet. Cyber theft is not just identity theft; it entails so much more. General targets of Cyber theft or Cybercrime are small networks, personal computers, and, at times, businesses.

Recently, results from the 2011 Global Information Security Workforce Study found that the nature of information security has become so critical in most organizations that the shift is moving to a greater alignment between the public and private sectors. Governments, for instance, are facing similar issues as private companies, and the need for prioritization of security knows no national or international boundaries. In fact, the study showed that the magnitude of the problem is so acute that there remains a critical need for more skilled professionals who can" successfully handle the evolving challenges associated with safeguarding the nation's data and [electronic] infrastructure" (U.S. Government and Industry, 2011). Indeed, while the detection and prosecution of Cybercrime remains difficult, since over 50% of the activity is generated offshore, the industries involved continue to change computer chips, memory and firewall changes, and new software designed to block unauthorized access (ICT, 2005). It is clear, however, based on all the evidence and commentary, that Cybercrime remains quite serious, on the rise, and a critical problem for the foreseeable future, one that may, however, cause society to choose between personal privacy and protection from outside internet crime (Brin, 1999, "Take Charge").

We might then wonder what the future of cybercrime might be. In 2007, a group of the top leaders in cyber security met and identified their view of the most likely future scenarios: 1) Laptop encryption will become mandatory in many government and other key organizations; 2) Targeted cyber-attacks, particularly against government agencies, will increase dramatically, as will their economic impact; 3) Cell and Smart phone worms will affect at least 100,000 phones annually, jumping from phone to phone. 4) Attack techniques will become more sophisticated and severe -- spyware will continue to become...

The war between the hackers and defenders will continue, with the only way of getting ahead is to make the attacker's job harder and increasing penalties for those who are caught (Paller, 2011).
References

Balkin, J.M. et.al. (2007), Cybercrime: Digital Cops in A Networked Environment,

NYU Press.

Brin, David, (1999), The Transparent Society: Will Technology Force Us To

Choose Between Privacy and Freedom? Basic Books.

Britz, Marjie, (2008), Computer Forensics and Cyber Crime, Prentice Hall.

Garfinkle, S. (2001), Database Nation: The Death of Privacy in the 21st

Century, O'Reilly Press.

Hallam, Phillip, (2008), The dotCrime Manifesto: How to Stop Internet Crime.

Addison Wesley.

ICT Task Force (2005), Information Insecurity, United Nations.

"Internet Fraud." (2010, January). Federal Bureau of Investigation:

http://www.fbi.gov/scams-safety/fraud/internet_fraud/internet_fraud

Knetzger, Michael, (2007), Investigating High-Tech Crime, Prentice Hall.

McQuade, Sam, (2005), Understanding and Managing Cybercrime, Wade.

McQuade, Sam. (2008), Encyclopedia of Cybercrime, Wade.

Mehan, J. (2008), CyberWar, CyberTerror, CyberCrime, IT Press.

Moore, Robert, (2005), Cybercrime: Investigating High-Technology

Computer Crime, Anderson.

Moreau, D. et.al. (2006), Cybercrime, Shinder, D.L. et.al. (2008), Scene of the Cybercrime, Syngress.

Wall, David S. (2007) Cybercrime: The Transformation of Crime in the Information Age,

Polity Press.

Wiles, Jack and Anthony Reyes, (2007), The Best Damn Cybercrime and Forensics

Book Period, Syngress.

Online

Sources used in this document:
references in:

http://www.bcs.org/server.php?show=nav.8272

Cain. M. (2003), "Managing Technology," cited in:

http://search.ebschohost.com.ezproxy.apollo.library.

Carvajal, Doreen, (4/6/08), "The Evolution of CyberCrime, Inc.," International
http://www.iht.com/articles/2008/04/04/technology/cybercrime07.php
http://proquest.umi.com.ezproxy.apollolibrary.com
http://www.idtheftcenter.org
http://is692sp10ao.blogspot.com/2010/04/research-findings.html
http://find.galegroup.com/ovrc/infomark
http://www.usdoj.gov/criminal/cybercrime/index.html
http://www.articlesbase.com/article-tags/cyber-crime
http://www.fbi.gov/cyberinvest/cyberhome.htm
http://www.symantec.com/norton/cybercrime/index.jsp
http://www.cybercrimelaw.org/
Govil, J. (2007, May 17). "Ramifications of Cyber Crime and Suggestive Preventive Measures" IEEE Xplore Digital Library: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?reload=true&tp=&arnumber=4374526&isnumber=4374432.
Martin, T. (2010, May 17). Credit Card Hijack Warning. The Mercury.com: http://www.themercury.com.au/article/2010/05/17/146595_tasmania-news.html
http://www.bcs.org/content/conWebDoc/8126
http://content.usatoday.com/communities/theoval/post/2009/05/67408221/1
http://bjs.ojp.usdoj.gov/content/pub/pdf/cb.pdf
"Security Articles on Cybercrime." (2010, October). Chartered Institute for IT: http://www.bcs.org/server.php?show=nav.11307
http://www.ftc.gov/bcp/edu/pubs/consumer/idtheft/idt04.shtm
http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf
http://www.prweb.com/releases/2011/5/prweb8400643.htm
Center for Contemporary Conflict: http://www.nps.edu/Academics/SIGS/CCC/conferences/recent/Presentations/Wirtz%20I&W.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Terrorism Cyber Crime Cyber Espionage and Cyber Warfare
Words: 1652 Length: 5 Document Type: Research Paper

Cyber-Crime, Cyber-Terrorism, Cyber-Espionage, and Cyber-Warfare Threats, Risks, and Vulnerabilities In the contemporary business and IT (information technology) environments, increasing number of business organizations are investing in the IT tools to enhance competitive market advantages. Integrating the IT tools in a business model has become a crucial strategy that organizations can employ to achieve a market success. While IT tools deliver several market benefits for businesses, nevertheless, businesses face enormous risks when integrating

Cyber Crime Purpose & Audience
Words: 3159 Length: 7 Document Type: Literature Review

Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated

Cyber Crime Is a Serious
Words: 2431 Length: 8 Document Type: Term Paper

These "stepping stone" computers can be located anywhere in the physical world because real-space is irrelevant to activity in cyberspace (Brenner, 379)." The use of stepping stones can make it difficult for law enforcement to find where an attack actually originated. As was previously mentioned in this discussion, Hackers are often used by companies to develop stronger security. Hackers often perfect their techniques at conventions that also feature hacking competitions.

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime Malicious Activities Like Identity Theft,
Words: 2334 Length: 7 Document Type: Term Paper

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Cyber Crime and Technology Crime
Words: 4865 Length: 14 Document Type: Research Paper

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now