Wednesday, May 6, 2020

Essay on Cyber Crime and Businesses Example For Students

Essay on Cyber Crime and Businesses Every day millions in some cases billions of dollars are made by businesses from income brought in by online sale of products and services. As businesses continually develop and expand their client base with online products and services so does the desire by criminals to exploit vulnerabilities in their e-commerce setup. The mass worldwide internet usage growth within the last 20 years has been â€Å"an approximate 16 million users in 1995 to an estimated 2,937 million in March of 2014† As the importance of e-commerce increases so does the need to protect the technological infrastructure that will carry out online transactions for each business regardless of its size. I will attempt to highlight and review the history of a few cyber crimes to show the progression of the crimes within the last 30-40 years. I also plan to review how the economy and consumers are impacted by cyber crimes. Finally I will make an effort to contribute with information gathering on how to lower the r isk of a cyber attack from and individual user to a large scale business. The term â€Å"hacker† has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term â€Å"crackers† for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm named Creeper which is an example of early cyber crime in 1970’s. The Creeper worm was able to gain independent access via modem and copy itself to remote computers. Computers that were infected by the virus displayed the message, â€Å"I’m the creeper: catch me if you can.† In 1981 Ian Murphy aka â€Å"Captain Zap† was the first cyber criminal to get convicted; he infiltrated ATT computers and changed the billing clock. The changed to the billing clocks caused people to received discounted billing rates during normal business hours. As time progressed so did the criminal sophistication as well as the damages to individuals and companies. In 1999 David Smith created the worm virus â€Å"Melissa† which traveled via Outlook. The Melissa virus was responsible for an approximate 500 million dollars in damages as it halted computer networks of at least 300 corporations. On a much larger scale â€Å"Titan Rain† was the named dubbed by the US Government to a series of carefully calibrated and almost untraceable cyber att ack that were ongoing for at least three years. The Titan Rain attacks were traced back to the Chinese government, it widespread and targeted the computer networks of NASA, US Military Defense Information Agency, Naval System Center, Lockheed Martin, Redstone Arsenal, and Sandia National Laboratories. The main purpose of the attacks were to gather intelligence and classified data as well as to find ways to leave computer â€Å"backdoors† open to allow other to infiltrate computer networks and systems for future attacks. The brief cyber crime history presented displays a quick glance of how cyber crimes have escalated in a short number of years. Proliferations of cyber crime activities have been increasingly more apparent within the last few years. Mainly due to tighten spending by the private sector and reduced financial liquidity made worse by the economic crisis. The costs associated by cyber crimes are extremely difficult to pin point as there are many factors to consider that can make up losses seen by individuals or businesses. Factors to consider in losses due to cyber crime are stock market manipulation, loss of sensitive data, intellectual property, productivity interruptions, and reputation damage. The ramifications of a single, successful cyber attack can have extensive implications that may include financial losses and loss of consumer confidence and trust. The overall monetary impact of cyber crime on society and government is estimated to be billions of dollars a year. â€Å"1 million-plus adults become cybercrime victims every single day and, if you break that down, it equates to a staggering 12 victims per s econd† The economic loss of cyber crimes is just a raw estimation as it provides base of the damage caused by illegal activities. .u6dede267a1fedd0e5cba97900d3c7b70 , .u6dede267a1fedd0e5cba97900d3c7b70 .postImageUrl , .u6dede267a1fedd0e5cba97900d3c7b70 .centered-text-area { min-height: 80px; position: relative; } .u6dede267a1fedd0e5cba97900d3c7b70 , .u6dede267a1fedd0e5cba97900d3c7b70:hover , .u6dede267a1fedd0e5cba97900d3c7b70:visited , .u6dede267a1fedd0e5cba97900d3c7b70:active { border:0!important; } .u6dede267a1fedd0e5cba97900d3c7b70 .clearfix:after { content: ""; display: table; clear: both; } .u6dede267a1fedd0e5cba97900d3c7b70 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u6dede267a1fedd0e5cba97900d3c7b70:active , .u6dede267a1fedd0e5cba97900d3c7b70:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u6dede267a1fedd0e5cba97900d3c7b70 .centered-text-area { width: 100%; position: relative ; } .u6dede267a1fedd0e5cba97900d3c7b70 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u6dede267a1fedd0e5cba97900d3c7b70 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u6dede267a1fedd0e5cba97900d3c7b70 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u6dede267a1fedd0e5cba97900d3c7b70:hover .ctaButton { background-color: #34495E!important; } .u6dede267a1fedd0e5cba97900d3c7b70 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u6dede267a1fedd0e5cba97900d3c7b70 .u6dede267a1fedd0e5cba97900d3c7b70-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u6dede267a1fedd0e5cba97900d3c7b70:after { content: ""; display: block; clear: both; } READ: Art Of Theatre EssayConsumer confidence has been severely damaged by the increase of cyber attacks and security breaches on individuals as well as large corporations. Recent examples of large scaled businesses that have encountered a cyber crime break-in within the last year were Target, Kaiser, and EBay. In large break-ins like the examples mentioned the majority of consumers feel that it is the corporations’ responsibility to protect them against fraud from such attacks that have been linked to stealing their personal information. Consumers also believe that retailers, credit card companies, and banks are not doing enough to protect the data they are entrusted wit h by consumers. The annual Symantec firm research study which reviews consumers’ online behaviors also highlights the dangers and financial cost of cyber crimes. The data in the Symantec research confirms the concerning results of the increase in cyber attacks. â€Å"Cyber criminal activities and related profit are in constant growth, the cost per cybercrime victim is up 50 percent, and the global price tag of consumer cyber crime is $113 billion annually.† The rise in cybercrime for large corporations is mainly due to inadequate protection of the companies as not enough time and resources are allocated to help minimize the risks. This creates the perfect ground of conditions for the criminals; as it makes cyber break-ins almost untraceable due to the time gab between the security violation and the point of discovery by the victim. The time gap also creates difficulty in building a prosecution case against intruders making cybercrimes far less risky than any other type of crime which is very much appealing to cyber criminals. It is clear that cyber crime is a huge problem threatening the private and public sectors as well as the integrity of the data within the internet. Prevention from attacks is the key although it may seem as an impossible task to accomplish with the many factors that need to be considered to have a secure computer infrastructure. The department of Homeland Security provides a list of security measures to follow to help with the prevention of cyber crimes for all types of computer users. †¢ â€Å"Never click on links in emails. †¢ Never open the attachments. †¢ Do not give out personal information †¢ Set secure passwords and dont share them with anyone. †¢ Keep your operating system, browser, anti-virus and other critical software up to date. †¢ Verify the authenticity of requests from companies or individuals by contacting them directly. †¢ Pay close attention to website URLs. †¢ For e-Mail, turn off the option to automatically download attachments. †¢ Be suspicious of unknown links or requests sent through email or text message. â€Å" In conclusion cyber crimes are acts against confidentiality and integrity by the illegal access to a computer system. Cyber attacks will continue to be on the rise if the gap between security violation and discovery is not tightened as well as the implementation of harsher punishments on cyber criminals. Cyber crimes throughout time have evolved from simple system infiltrations to display the ability of a break-in for self satisfaction to multi-million loss threats to both individuals and companies. Successful system infiltrations can have devastating outcomes from individual user file corruption or file encryption for extortion to large scale security data loss breach of a large corporation. All internet users need to be vigilant in tracking and combating cyber crimes. Securing the network infrastructure as well as the operating systems is a crucial part of a proactive strategy to defend cyber crimes. A recovery plan must be in place as a preventative measures incase all other secur ity measures fail. Bibliography 1. Internet Word Stats. (2014, January 1). . Retrieved , from http://www.internetworldstats.com/emarketing.htm 2. Hacker term. (2014, January 1). . Retrieved , from http://en.wikipedia.org/wiki/Hacker_(term) 3. Computer Virus. (2014, January 1). . Retrieved , from http://en.wikipedia.org/wiki/Computer_virus 4. Santoso, A. (2014, January 1). A Short History of Hacking. . Retrieved , from http://www.neatorama.com/2006/08/28/a-short-history-of-hacking/#!PVPc2 5. Titan Rain. (2013, January 1). . Retrieved , from http://en.wikipedia.org/wiki/Titan_Rain 6. What are Titan Rain Attacks?. (2013, January 1). . Retrieved , from http://www.wegilant.com/what-are-titan-rain-attacks/ 7. The Economic Impact of Cyber Crime and Cyber Espionage. (2013, January 1). . Retrieved , from http://www.mcafee.com/us/resources/reports/rp-economic-impact-cybercrime.pdf 8. Horbury, A. (2013, January 1). CyberCrime Takes Its Toll. . Retrieved , from http://www.symantec.com/connect/blogs/cybercrime-takes-its-toll 9. http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013 10. Protect Myself from Cyber Attacks. (n.d.). . Retrieved , from https://www.dhs.gov/how-do-i/protect-myself-cyber-attacks

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.