Cyber Crime
Cybercrime has been a hot button topic in recent years. A crime involving digital services or computers, cybercrimes typically is when someone targets a computer for a crime, uses a computer as a tool for a crime, or has computer containing evidence of a crime. Since the rise of information technology, cybercrime has become taken center stage as a shift in criminal activity means more criminals doing business online and using computers or attacking computers as a result of it. Criminal investigators and law enforcement have thus begun efforts to control prevent and investigate cyber activities to avoid major problems for the Government, agencies, organizations, and individuals. As one article put it, it is a battleground. "The digital world has become a battleground for the forces of good and evil. There is an ever increasing awareness that the digital world provides an unlimited opportunity to further one's goals" (Gregory & Glance, 2013, p. 51).
A way law enforcement is tackling cybercrime is through the hiring and retention of highly skilled cybercrime experts via business enterprises and Government. This guarantees compliance and enforcement of international guidelines for acceptable standard usage of technological devices and computer in private and in work places. Although emphasis must be placed on prevention measures, control and investigation measures are vital as well in maintaining systems free of illegal breaches.
In case of any breaches, forensics experts must be called as they are the ones to conduct the necessary forensic examinations, analysis, reconstruction, and documentation of any crime scene, presenting evidence to the Court and other appropriate authorities that may lead to the arrest, prosecution, and conviction of the suspected criminal. Another aspect of cybercrime aside from breaches are digital assets. Certain private information like social security numbers and tax information can easily become stolen and lead to identity fraud. These kinds of digital assets must be safeguarded. Therefore, research needs to point towards new and innovative strategies to circumvent these crimes and protect those affected by it.
Cyber-Crime Control (CCC)
CCC deals with the development of sufficient policies to help control cybercrime activities. Any policies developed must spell out suitable punishment for convicted cyber criminals. Convictions are as a result of court verdicts and will act a deterrent measure for any person wanting to engage in criminal acts connected to technology.
Cyber Crime Prevention (CCP)
CCP involves emphasis on the training of administrators and users of cyber space, security awareness, best practices and so forth to avert and minimize the occurrence of cyber incidents. Underground hacking techniques while the cause of some cybercrimes can help security managers and administrators understand how criminals works, thereby helping prevent cybercrime. To think like a hacker is to use the techniques and tools hackers use thereby helping to expose the various ways of detecting and thwarting cybercrime activities through training and education. Recognition of users as the weakest link is paramount since that is where most of the damage is done. "A solution out of this dilemma is a cyber-security policy decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere" (Dunn Cavelty, 2014, p. 701).
The types of tools that will aid in these efforts are open source and commercial tools that will include, however, not limited to:
1. Backtrack 5r3
2. email tracker pro
3. Nmap
4. Nessus
5. Retina
6. Metasploit pro and framework
Cyber Crime Investigation (CCI)
If and when a system becomes compromised, as it will inevitably happen, regardless of measures taken to prevent or control the situation, investigations will be implemented. Investigations assist in unraveling any clues behind the attack and could help trace the hacker through and IP address, server, or other means of digital footprints. While this is a hard task to complete, forensic investigation of computer system and network based attacks provide experience to help prevent future attacks. From identification of any clues, to collection of evidence, to preservation analysis, then documentation, and finally presentation of evidence, here is where things like victimology are observed.
Victimology
1. Victimology is the study of any victim of crime as well as the psychological effects they have or are imposed on them.
2. Victimology may not always mean an individual. It can be a bank, website, ministry, server, agency, or any other target (Doerner & Lab, 2014).
Links to the Victims include:
Work related
Hobby related
Work related
Geographical
Family related
Analysis of the victim helps reveal the reason...
Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special
Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch
Part of the problem is that America's national crime reporting systems, such as the National Incident-Based Crime Reporting System and the Uniform Crime Report Program managed by the Federal Bureau of Investigation (FBI) in cooperation with thousands of U.S. law enforcement agencies, do not specifically identify or distinguish between many forms of online crimes. Nor do they effectively distinguish between traditional in-person forms of crime that are substantially facilitated
Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On
CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past
Criminal Investigations: Changes in Cybercrime The rate at which internet usage is growing is expeditious. The World Wide Web is fast eliminating the physical borders that originally existed between nations and individuals, and rapidly transforming the world into a global village. The conduct of business has been made easier, and so has education, sports, communication, to mention but a few. Thanks to the internet, people located miles away from each other,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now