Essay Available:
You are here: Home → Essay → Literature & Language
Pages:
1 page/≈275 words
Sources:
Level:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 3.6
Topic:
Cybercrime Case Study (Essay Sample)
Instructions:
Describing cyber crime issues and proposing solutions source..
Content:
Cybercrime Case Study
Name
Institution
Cybercrime is one of the emerging serious threats in the digital age (Gerdes, 2009). Governments, intelligence agencies and police units spend significant amounts of resources in reducing the adverse effects of cybercrime because the acts of cybercrime architects can halt the economic progress on any state that relies on digital products such as the internet to conduct business. Initiatives to curb cyber threats across the world have also been put in place because this challenge in a global issue that requires a response from different players across the world (Gerdes, 2009).
Key issues in Cybercrime
Cybercrime is a wide topic. Different types of issues can be described under this topic (Miller & Cross, 2013). However, some of the issues are less serious than others and thus the degree of response to different types of cybercrime varies considerably. The most common issues that most individuals, businesses and government organizations battle with today include:
Viruses and worms
Viruses and worms are common issues that arise from the use of computers. These issues are serious since they can reduce the functionality of a computer system. These computer programs affect various parts of the computer system especially the storage devices or computer network. Viruses and worms reduce the functionality and reliability in different ways. For instance, it replicates information without being noticed by the users (Miller & Cross, 2013). Viruses and worms also reduce the ability of computer systems to process required information.
Trojan
Trojans are programs that appear legitimate to the user but when the same programs are run, the program will locate personal details such as passwords which make the computer more vulnerable to entry in the future by unauthorized persons. Trojans can also destroy installed programs and data in the hard disk. Trojans have led to the loss of millions by business entities, and it is an issue that needs to be addressed amicably if more losses should be avoided.
Phishing
Phishing attacks are another form of cyber-attack that has caused sleepless nights to millions of individuals and business owners (Miller & Cross, 2013). A phishing attack is an organized attack that is meant to steal passwords and login information that belongs to other people and entities. Bankers are normally victims of phishing attack as phishers frequently target bank accounts.
Fiscal fraud
This issue has gained full momentum in the recent past. Even though it is least known by many, this form of crime is real and serious. This crime targets businesses and individuals that pay for products and employees through use of online systems (Gerdes, 2009). The cyber attackers destroy processes such as tax collection and in most cases; they make fraudulent claims for rewards and benefits that they do not deserve. Fiscal fraudsters not only reduce government revenue in by interfering with the tax collection systems, but also reduce the chances of doing business in a safe and cost effective way. Online payment and collection of tax is seen as a safe and effective method but with the entry of these fraudsters, the world may take time before it can adopt the digital system.
Resolving the Cybercrime Issues
Our states should not lag behind in embracing technology simply because cyber attackers have hampered the adoption of technology in doing business (Gerdes, 2009). Business owners should learn that dealing with cyber issues is cheaper than staying away from the digital technology. As a result, business owners, government agencies and intelligence service providers should implement and enforce measures that will facilitate the eradication of fraudsters (Gerdes, 2009).
Law enforcement agencies have a mandate to ensure that those who break the regulations and law are identified and charged in a court of law. The following measures can aid in reducing cases of cyber-attacks in the business world.
As an agency that fights the cybercrime in the state, we endeavor to empower organizations to adopt reliable measures that will aid in identifying cyber criminals. As part of a law enforcement program, organizations and individuals should be compelled to abide by the provisions that guarantee the use of servers (Gerdes, 2009).
Maintenance of strict password-protocols should also be encouraged. The laws that govern online activities in the state do not permit the use of the internet to harm others. As a result, strict rules have been enacted to regulate online activities. Those who have been found to have violated the law should be brought to book so as to warn those who do not comply with the law. It is unbelievable to learn that victims of cybercrime at times perpetrate such crimes especially after failing to adhere to the protocols that have been put in place to curb online criminal activities. Other options which may yield good results involve compelling organizations and individuals to use reliable antiviruses, anti-spyware and other products. Law enforcement agencies should educate such entities that unless they a...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- An Analysis of Texas Veto Bill. No. 217 Of 2013Description: An Analysis of Texas Veto Bill. No. 217 Of 2013 Literature and Language Essay...1 page/≈275 words| APA | Literature & Language | Essay |
- Formal Logic Argument From Given EditorialDescription: Formal Logic Argument From Given Editorial Literature and Language Essay...1 page/≈275 words| APA | Literature & Language | Essay |
- CommunicationDescription: Communication Literature and Language Essay...1 page/≈275 words| APA | Literature & Language | Essay |