Essay Available:
You are here: Home → Essay → Technology
Pages:
3 pages/≈825 words
Sources:
3 Sources
Level:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:
Online Theft / Cybercrime Against Critical Infrastructure (Essay Sample)
Instructions:
it is about online theft and the critical infrastructure involved.
source..Content:
Cybercrime against Critical Infrastructure
Name
Institution
Cybercrime against Critical Infrastructure
Cybercrime includes crimes such as spamming, hacking and phishing that are committed over the internet or computer systems platform. Due to growing and revolution in technology, cybercrime tactics are also changing and growing every day. More and more criminals are taking advantage of this type of criminal that is done in secret to fulfill their malicious desires. As a result, this predicament should not be taken lightly due to its fast growing nature in relation to technology. Consequently, future possible effects should be peeped at and analyzed forehand to control and curb them. This paper therefore intends to touch on cybercrime in relation to future infrastructure.
According to Micro Trend (2015), scenarios of possible future cybercrime in relation to infrastructure should be looked at in the viewpoint of the normal internet user, manufacturers, communication service provider and government. Data ownership should be monitored in a given network system therefore allowing a distinction between misuse of that particular data and legitimacy. The vicious attacks on significant infrastructures and vital assets are on the rise. Cybercriminals are no longer restricted to the cyber world. They are now targeting power grids, water supply systems, and other fundamental services, intimidating our very way of life and global security.
Global political tensions have also escalated as a result of cybercrime. Different countries invest on spies to hack network systems of other countries. This promotes tensions and creation of rifts among those particular countries. In addition, the high speed internet that is evolving regularly encourages hackers speed to access private information of individuals hence proof of future consequences of cybercrime.
As a matter of fact, data exchange is not free and there are a lot of financial transactions involved. To ensure that these finances do not go to waste as a result of cybercrime, associated parties dealing with cybercrime should devise possible ways of compensation in terms of data recovery and financial reward respectively. In addition, governance of network infrastructure should be both locally and globally to ensure that critical issues such as global terrorism are controlled. This will be possible if states come together as a team not only in future but also presently because terrorism is at this time a global crisis. As much as we anticipate future solutions, present measures should also be contemplated.
In relation with Trend Micro (2015), future infrastructure will also be hampered by cybercrime when public and private sectors do not come together jointly to fight this threat. Protection of infrastructure must be a joint undertaking and responsibility as a result it should start from the organization. When organization has the ability to monitor and thwart cybercrime, then relevant associates or security agencies will have simple tasks of just apprehending the culprits. Furthermore, governments should release funds to train and inform the general public on how to learn tactics of defense in relation to cybercrime as far as future preparation is concerned. This can be done through formation of small groups in the community to be trained network defense tactics. When a particular section in the community are informed about cybercrime then that means the all community is informed. This initiative will be a vital tool in the community especially to youths who are recruited by terrorist groups through internet.
According to info security (2009), it is also important that cybercrime be classified into groups so as to come up with appropriate ways to charge each one of them. A hacker, prankster, cyber bully, cyber terrorism must all be distinguished from one another. Each one is different from the other though malicious and dangerous cybercrime such as terrorism can hide their motives under simple cybercrimes such as spamming, phishing and other related simple cyber abuse. A crime is a crime irrespec...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- The Technologies Which Might Exist in the Future - ResearchDescription: As technology remains to be the application of scientific knowledge, machinery and equipment will be in the making as long as science exists....1 page/≈275 words| 3 Sources | APA | Technology | Essay |
- Classification of CMS Core Measures and Data Used as Either Easy or HardDescription: The essential core and menu measures that were employed in the reporting can be classified as either easy or difficult to collect...2 pages/≈550 words| 3 Sources | APA | Technology | Essay |
- Gradual Development of Refrigeration Process: Main Componentry Description: Refrigeration is process of transferring heat from an object in order to cool it. Controlled conditions regulate movement of heat from one location to another...4 pages/≈1100 words| 4 Sources | APA | Technology | Essay |