Verified Document

Fighting Cyber Crime With More Technology Essay

Technology Crime Technology in Crime

Cyber crime is a growing threat characterized by an increasing sophistication that makes it difficult to take a proactive stance on prevention. For instance, there are people in China whose job it is to obtain competitive information from companies based in the United States. Competitive information can be protected, proprietary data the loss of which can cost companies millions of dollars over the short-term, and even greater amounts over the long-term. The scale of cyber crime impacting businesses ranges from simple pirating of entertainment such as music and movies -- which can certainly be costly when it occurs on a large scale -- to accessing databases that contain credit or personal information protected by law and ordinarily secured by a constellation of cyber strategies and teams of internet security professionals. The cumulative cost of petty cyber crime is astonishingly high -- the cost of organized, systematic attacks on digital privacy is staggering. Consider that activities that fall into these categories are only the proverbial tip of the iceberg.

Taking over a database marketing system is only a short step away from taking over the technology information systems that control critical services such as electricity grids, banking systems, or military communication. Within the past few years, several successful attacks on substantial digital information and communication systems have occurred. The fantasies portrayed in the movies and on television today are not far removed from the actual incidences that occur. Indeed, crime...

A popular belief is that the lion's share of cyber attacks and internet security breaches are not conveyed to the general public -- or if they are, the disclosures come well after the fact, so that the information is yesterday's news and is quickly eclipsed by the next wave of social exigencies. While it is completely understandable that the government seeks to quell discussion about failures of the security systems, this also works to reduce the overall sense of violation and alarm that citizens would be likely to experience if they knew the full extent of the onslaught of successful cyber attacks.
To fully appreciate the extent of potential damage that can result from cyber attacks, one has only to recall the absolute breakdown of systems during times of natural disasters. Hurricanes Katrina and Sandy gave Americans a taste of society stripped of its capacity to communicate and provide essential services to a people isolated by large-scale disaster. Consider that natural disasters are indiscriminate, flattening everything in the area on which the full force of nature is let loose. Contrarily, cyber criminals are able to be very discriminating in with regard to the systems they take down, the order in which they take those systems down, and the degree to which they disable systems that could be used for backup or recovery.

In any country, fundamental mistrust of government may foment. Remarkably, the more personal freedom people in a society experience, the more they may…

Cite this Document:
Copy Bibliography Citation

Related Documents

Cybercrime Is a Concept That
Words: 3003 Length: 10 Document Type: Essay

Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Technology, Terrorism, and Crime Apa . Technology, Terrorism,
Words: 1436 Length: 4 Document Type: Essay

Technology, Terrorism, and Crime (APA). Technology, Terrorism, and Crime One of the most heinous terrorist groups currently operating in the U.S. In called the "Aryan Nations." This group openly states on their website that they have been "Fighting Jewish Takeover for over 35 years." (aryan-nation.org) This group of domestic terrorists post articles on their website with grammatically incorrect titles like "The menace of Multiculturalism," and "Jews that control Hollywood: Meet the filthy

Cybercrime Cyber Theft Is a
Words: 2933 Length: 8 Document Type: Term Paper

Think of a bank or mortgage company who is hacked, and the amount of personal data that can be downloaded and used elsewhere ("Cyber Investigations"). In addition, many hackers come into governmental or business computers and crash those servers, place viruses, bots, Trojans, email bombs, etc. -- or mine the data or manipulate the data -- where for competitive advantage or simply "as a prank," this is all part

Internet Security Measures an Assessment
Words: 3999 Length: 10 Document Type: Term Paper

Internet Security Measures- An Assessment The world of the Internet is truly an amazing and wonderful place where any information on any topic is available, right at your fingertips, with the mere click of a button. The Internet is very much like a huge city where high rises filled with honest people and slums filled with the lower classes coexist side by side; where there are both good people as well

Carla Murray Timothy Broyles the Number of
Words: 2420 Length: 8 Document Type: Research Paper

Carla Murray Timothy Broyles The number of online security breaches is increasing day by day. For instance, with the Sony Playstation data breaches to millions of small breaches; something must be done to protect the online security of citizens as well as our own government (Sony Playstation System Hacking). The question then becomes who is going to do it? Can the American citizens trust the United States government to ensure their security

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now