Essay Sample on Cyber Crime and Cyber Security

Paper Type:  Report
Pages:  5
Wordcount:  1295 Words
Date:  2022-11-13

Introduction

In different parts of the world, cybersecurity is being looked at as a new urgency since the digital economy is mature over the past years. Businesses and consumers entirely rely on the informational system. Moreover, day by day the importance of cybersecurity tend to grow.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

At the same online services tend to touch on every aspect of life. In several occasions, people have been able to communicate with their family's relatives and friends as well (Debatin B & Hughes, 2009) Other than that, they have also been able to do the tax return, ordering food and shopping among several others. And lastly, we have been able to obtain some crucial information about ourselves concerning technological developments. However, this has subjected a considerable population to cyber-criminal making many people to have negative opinions about these technical issues .Cyber-crimes has made 16.7 American people to become victims of fraud in 2017 as a result $ 16.8 billion were lost according to report by some advisory firm called Javelin Strategy and Research. Out of that amount, for instance, the criminal managed to do away with about $ 5 billion through online identity theft whereby the victims were robbed from their desks without coming close to them. Therefore, this has called for a survey to find the real cause of the various happenings. This survey was to be conducted in Washington D.C as outlined in the number of questions below.

  1. What is online identity theft?
  2. How do we lose our online identity?
  3. What are the roles of online breaches in online identity theft?
  4. What do cyber-crimes do with your online identity?
  5. What should one do to avoid online identity theft?
  6. What can someone do especially if you're the target of online identity theft?
  7. What are the current trends in the cybercrime?
  8. What are some of the problems being experienced within the cybercrime?
  9. What are some of the emerging issues within the cybercrime?
  10. What are the implications of emerging issues within the cybercrime?
  11. What are some of the trends within the cybercrime?
  12. What are some of the survey issues on cybersecurity trends?
  13. What are the practices and concerns by the government on cybersecurity issues?
  14. What are some of the key challenges to society about this?
  15. What are some of the concerns and solutions to cybersecurity?

A Report on Cybercrime

According to the survey that was done within the Washington D .C several findings were made. First, the review managed to get clear illustrations on what happens with online identity theft. According to one of the university student who was interviewed described it as an act whereby malicious actor obtains enough, and sensitive information about an individual and further impersonate him or her online accounts and thus perform some corrupt activities within it. However, these malicious actors have different intention whenever they have invaded your mind. For instance according to him concerning online fraud, these actors will only be interested in your social security number or maybe bank account number (Vijaya Geeta, 2011). He further stressed that in some circumstances, e.g. media account takeover, and at this point they may only be interested in a password to create damages. Secondly, according to research that was done among high school students on how one may lose his /her online identities. According to one of the students he stressed that many people are always ignorant on how they share their information online while on the other hand not always they take keen interest the adverse outcome of that. Giving his point concerning this, he clearly stated that the wealth of data available might make hackers to look for their accounts (Marshall, & Tompsett, 2005). These students were also able to mention that social engineering is the beginning of all cybercrimes. .It is an attack that is characterized by tricking users into giving away their sensitive information or malware being installed in their computers. Therefore, this survey tends to prove that human effort to commit cybercrime will still continue unless a proper remedy is put in place to curb this.

This survey was also carried out within the offices whereby there was the need to find out the role of data breaches in the online identity theft, and they were able to state users can really do very little cyberattacks as oppose to online services people use. Concerning this, they were able to mention massive data breach as an example of credit card reporting agency Equifax which renders access to names, birth dates and social security numbers as well. Other than that, these office bearers were also asked to state what cybercriminals do with their identities. According to them cybercriminal predominantly does target high profile individuals and organizations as well .for instance in 2016 the email account of John Podesta was invaded by a spear -phish and leaked his private communication to whistleblower website WikiLeaks. Consequently, as a security professional this survey may help me to get equipped with current trends with regard to cybercrimes.

Additionally, according to this report there was also need to know what one can do in order to avoid online identity theft, their attempt to respond to this question was to stay true to the principles of digital hygiene, which would mean keeping the various operating system, antivirus, browser and other software's up to date .and lastly according to report there was need to know what one can do especially if you become the target of online identity. According to office bearers sometimes cybercrimes are inevitable but one should be in apposition to battle it out, and therefore in case of massive data breaches, one should seek for 'have I been Pawned" being a website that tracks data breaches.

However, this survey was also carried out to discuss the current issues, trends, and problems in areas of cyber-crime. According to this survey it was seeking to know some of the current trends with regard to cybercrime which includes the following One, the high growth of internet use in Asia according to them has resulted in the development of commercial-scale exploit toolkits with criminal networks that focus on monetization of malware has promoted the risk of cybercrime .secondly, they also elaborated on the digitization pace of financial transactions. This constitutes 22 percent payments by consumers, and three is a belief that this would overtake cash transaction by 2023.This survey was conducted along the streets whereby there was the need to know some of the problems being faced within the cybercrime (Santos, L, 2015). One, they were able to note that despite all the efforts to ensure that this is completely done away with. However, cybercrime is too broad and widespread and thus can never be left on the hands of the few individuals, i.e. that is politicians and maybe the police to solve it .Secondly, there is no proper expertise to pass effective laws. During this survey, we were also able to note from them some of the concerns and solution to cybercrime. One, all nation are advised to look at cybersecurity as a common task, and thus they will be able to strengthen their governments .Therefore, it needs to join collaboration in finding solutions.

References

Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. Auerbach Publications.

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication, 15(1), 83-108.

Cao, Y., & Yang, L. (2010, December). A survey of identity management technology. In Information Theory and Information Security (ICITIS), 2010 IEEE international conference on (pp. 287-293). IEEE.

Marshall, A. M., & Tompsett, B. C. (2005). Identity theft in an online world. Computer Law & Security Review, 21(2), 128-1

Santos, L. (2015). Cyberspace Regulation: Cesurists and Traditionalists. JANUS. NET, e-journal of International Relations, 6(1), 86-99.

Vijaya Geeta, D. (2011). Online identity theft-an Indian perspective. Journal of Financial Crime, 18(3), 235-246.37.

Cite this page

Essay Sample on Cyber Crime and Cyber Security. (2022, Nov 13). Retrieved from https://proessays.net/essays/essay-sample-on-cyber-crime-and-cyber-security

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism