The Growth of Cyber Security.
1. Introduction.
a. What is cyber security?
b. Importance of cyber security.
2. Types of cyber crime
a. Credit card fraud.
b. Phishing
c. Investment fraud
d. Hacking
3. How to avoid cyber crime
a. Profile of cyber perpetrators (cybercriminals)
b. Victims
4. Conclusion.
5. References.
a. FBI website
b. Cybercrime: Criminal Threats from Cyberspace by Susan W. Brenner. (Book)
c. Encyclopedia of cybercrime by Samuel McQuade (Book)
d. Principle of Cybercrime by Jonathan Clough (Book)
e. Freedom from Fear magazine.
f. Center for Strategic and International Studies (Internet document)
g. Bright hub website.
The Growth of Cyber Security.
cyber security has become a vital tool in effort to defend and secure the cyberspace.
Introduction:
Cyber security is a security practice that is used to counteract different forms of cyber attacks from cyber criminals. In other word, cyber security is a practice that detects, avoids abuse and misuse of computer systems.
Importance of cyber security:
The world has demonstrated the growth of cutting edge in information technology particularly in computer industry. Technology has grown up to the point that most activities in businesses such as banks, schools, government entities involve the use of computers or transfer of data from one point of the world to the other. We also have seen the improvement in data transfer technology whereby broadband technology has dominated in internet industry. People in rural areas have adopted the use of broadband internet to meet their needs. Rural businesses have been adopting more e-commerce and Internet practices, improving competence and expanding market reach. Some rural retailers use the Internet to satisfy supplier requirements. These activities need protection from bad guys (cyber criminals)
The Report on Why Be Concerned About Cyber-Security?
... Internet. Therefore, the limitation of each security technology existing in today’s computer and network environment impact the efficiency of cyber security ... source of creativity, innovation, and growth. Ultimately, success in addressing cyber security problems lies in multi- ... of cybercrimes and cyber nuisances such as spam, phishing, and computer fraud. Because today’s technologies generating cyber ...
Healthcare industries have been adopting the usage of internet such as telemedicine and telesurgery to provide health services in rural communities. All these medical processes need broadband services and safe (secure) techniques or practice in order to take place. The government agencies such as FBI, CIA, Homeland Security Department, States Department, Department of Defense, National Security Agency and so on need secured data transfer when it comes to share information about national security issues such as protecting the country from the foreign attack.
By looking those few instances, you will see importance of cyber security practices to be implemented and applied. With increase of cyber attack against individuals, private organization and other network infrastructure, a cyber security practice can be a best method to assess how an organization identifies and acts in response to information security threats instantly. Most of organizations have internet and information security policies. An organization that doesn’t have these kinds of safe guard policies will ultimately find itself as a cybercrime victim. I believe public should be informed and educated to implement some of security policies against cybercrime. Awareness of these threats should be raised and how they can be avoided.
Types of cyber crime
Cyber criminals try different ways to commit crimes on cyberspace. These cyber crimes that 4 of them will be extensively dissected later include:-
The Essay on Cyber-security
The internet is no man’s land. The whole world has been melted into a global village as the Internet pervades the homes, offices and even phones. The internet has become closer to our thoughts and feelings every day as chat engines can now express feelings and depict thought patterns. Information about self, plan of work, career, and family are also speedily available and sent via the internet. ...
a. Credit card fraud
b. Phishing
c. Investment fraud
d. Hacking
e. Business fraud
f. Email spam
g. Internet Auction
h. Non-delivery merchandise.
i. Electronic money laundering
j. Child phonographs.
Credit Card Fraud.
This is a type of cyber crime where by criminals may access your financial information through fake business website or telemarketing organization. This cyber crime has something to do with identity theft. Once these cyber criminals get your personal information, they open credit cards under your name with high limits, and before detected, can accumulate quite the bill. Most of numbers of these crimes are commenced online; other things can be related to credit card fraud such as automobile and cell phone purchases.
The other type of credit card fraud is known as credit card skimming. According to (Clough, p.196, 2010) “Credit card skimming is ‘the process by which legitimate credit card data is illicitly captured or copied, usually by electronic means’. This technique exploits the vulnerabilities of magnetic-stripe technology, present on many credit, debit and other transaction cards. While allowing cards to be programmed with data quickly and easily, it also means that the data can easily be copied. Although commonly referred to as ‘credit card skimming’, the practice can be applied to any card which carries data on a magnetic-stripe”.
These criminals sometimes facilitate the trade in identity information online. Once the credit or credit card is accessed, the amount on that credit/ debit card has been known, the perpetrator trades or sells it at a lowest prices to someone else outside the country. According to (Clough, p.199, 2010) “The price of information which is available online varies depending upon its quality and level of authentication, but is surprisingly inexpensive. The data taken from the magnetic strip on a credit or debit card (known as a ‘dump’) may cost between US$0.10 and US$25 (those which include PIN or the security identification number of the card being more expensive) while bank account details range from US$10–1,000.84 Packages of personal identifying information about a victim, known as ‘Full Info’ or ‘Fulls’, are available for between $0.90 and $25”. Most of buyers of this type commodity are West Africans such as Nigerians, Cameroonians, and Togolese etc. In turn, they use stolen cards to purchase different items, once those items get delivered in US by people set up by cyber criminals, those merchandises are then shipped to West African countries for further transactions.
The Essay on Is Credit Card Necessary in Our Life
A credit card is a card issued by a financial company to the holder in order for an individual to borrow funds often at a point of sale. It is important to note that credit cards charge interest and are basically use for short-term financing. Moreover, the interests charged on credits cards are enacted usually one month after purchasing is made and borrowing limits are pre-set. This is with regard ...
Phishing.
Phishing is a combination of technological development and social engineering, which may broadly be defined as ‘the creation and use by criminals of e-mails and websites . . . in an attempt to gather personal, financial and sensitive information (Clough, p.192, 2010).
In phishing schemes, a fraudster poses as a legitimate entity and uses e-mail and scam websites to obtain victims’ personal information, such as account numbers, user names, passwords, etc (FBI, 2010).
In this type of cyber crime, the criminals send you a list of emails or text message regarding your financial or personal information. They pretend those emails or text messages come from your financial institution. In those emails, the perpetrators tell you that your account have been compromised and for security reasons you need to update and verify your personal and financial information such as social security number, credit, debit or bank account number, PIN number and password. If a victim targeted is not clever enough to detect that crime act, will be directed by a link set up by criminals to the fake websites that appear to be authentic and similar to your financial institution. From that point, the victim losses his/her personal and financial information if she/ he decides to give those information out. Once these criminals gain those personal information such as social security number, date and place of birth and financial information such as credit, debit or bank account number; they can duplicate credit or debit card and sale or trade them. They can also open up lines of credit using your personal information or use your credit or dedit card to purchase stuff online while the victim ends up with a mountain of bills.
The Essay on Criminal Investigations
The method of inquiry is the way that an investigator or detective gathers information about a specific case. There is several different method of inquiry such as evidence collection, witness and victim statements, and information stored in public and private databases. The methods of inquiry are used to figure out what happened at a particular crime scene. A criminal investigator is trying to ...
Hacking.
This is a type of cyber crime where by cyber criminals access data by breaking in computer systems. Organizations that store large numbers of personal information such as educational institutions, financial institutions, hospitals, government agencies are prime suspects of this kind of attack. Some foreign countries that compete with US in various aspects such as military, economy. By using certain malwares, criminals or foreign entities send a virus or Trojan to a targeted region or organization with specific mission. There are several Trojans out there with different specific attacks. But I’ll talk one specific Trojan that is designed by criminals to access personal information. A Trojan known as “Backdoor-BAC” is well known by the internet security firms. This type of attack is sent to the targeted computers, when that Trojan reaches the targets, it downloads keyloggers. A keylogger is a “hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer” (Mitchell, 2010).
Once a keylogger is downloaded in a targeted computer, it gets executed and runs in a background in a such a way that cannot be detected by physical eyes if you don’t have anti-spyware application. The truth of the matter is, the keylogger captures network information and logins and waits for the user to browse a websites mostly of financial institutions that requires authentication. The keylogger gathers transaction data, such as username and password, and then sends the stolen data to a devoted host, which enters the stolen data into log files. Once these criminals get that information, they can use to access your bank account and transfer whatever money you have to the designed local or foreign accounts. The finally use that money to buy whatever they need.
Bibliography
Clough, J. (2010).
Principles of Cybercrime. New York: Cambridge University Press.
FBI. (2010, 11 15).
New E-Scams &Warnings. Retrieved from The Federal Bureau of Investigation Web Site: http://www.fbi.gov/scams-safety/e-scams
Mitchell, B. (2010, September).
The Business plan on Computer Information Systems
INFORMATION SYSTEM CASE STUDY Great-West Life & Annuity Insurance Company is an indirect wholly-owned subsidiary of The Great-West Life Assurance Company the largest stockholder-owned insurance company in Canada, and a member of the Power Financial group of companies. We are searching for a new enterprise system. We are looking for a structured approach that eliminates the guesswork and makes ...
Wireless/ Networking. Retrieved from About.com.