sales greatly suffer years later due L a w
Respond to Stated Questions and reply to two classmates post. 250 words each
Stated Question: What is new or different about cybercrime? How might the growth of cybercrimes shape the ways in which the Internet continues to grow in the future? How does public discourse represent the problem of cybercrime? Is cybercrime inevitable in a connected and globalized world? Is their evidence that cybercrime involves organized crime groups, or is it an individual criminal act performed by a lone person or a group of hackers?
Classmate 1 Shankita:
There is no doubt that the internet and the increased level of technology being used in our society today has impacted the world not only in a positive light but has also influenced the ways in which criminals commit crimes. As outlined by Moise in his article Aspects Regarding the Impact of the Internet on Society, the development and introduction of the internet have increased the occurrences of spam, identity theft, infringement of rights related to intellectual property, infrastructure concerns regarding access and interconnectivity, and opened the door to cyber space and the growth of computer crimes around the world (2014). In layman’s terms the idea of cybercrime is the same crimes committed with greater ease, and the ability to access information from remote locations across the world instead of having to sit at an actual device in order to steal information. So, while the crime is the same, the ease at which one can commit these acts has become increasingly more simplistic.
The internet has brought tremendous improvement to many areas of society and created opportunities through its use for many to reach goals that may have seemed impossible before. It has been said that however the evil on the internet cannot be stopped, and for many this may seem true. Yet individuals will not be willing to give up the access to the internet and it has been said the internet security is a greater concern to the government than it is to the everyday user. From the eyes of government, the internet is described as an “ominous threat” (O’Neil, 2016). The challenge is to focus on the protection of the infrastructure, and design access in a way that minimizes the ability for criminals to gain access and raise public alarms. There is a need to focus on education and establishing criteria related to how one can protect information and solidify plans that focus on cyber security and the steps that can be taken to reduce the risks of cyber crimes (O’Neil, 2016). Legislation can only do so much towards this, and it becomes a point of educating the public and finding a way to increase their focus on protection, while also enjoying the benefits of the internet.
In term of who is committing these crimes there is a mix of criminals who have found success in computer crimes and invoking breaches of cyber security platforms around the world. The United Nations Office on Drugs and Crime reported that there are numerous criminal groups that engage in organized cyber crime focuses on obtaining data and identify documents, banking details, in an effort to formulate crime plans focused on substantial financial loss (Fromiti, n.d.). On the opposite side of the spectrum, we have all seen scams that take place using technology and the increased use of social media to scam individuals out of money-making fake promises. We see reviews of online retailers who charge for products that never ship only leaving individuals empty handed after spending their hard-earned dollars. Cyber crime is at the hands of organized criminal groups, to the hacker that is out to cause a chaos and have a “little fun”.
The public knows the risks that exist, and yet the positive effects of the internet and its development have overshadowed for many the risks. The push for more education, higher levels of investigation and increased legislation are the only manner in which we can begin to curb the influx of criminals that use the internet and technology in general to commit crimes. The expansive nature of the area they can cover and the ability to mask their locations makes investigating these crimes, and successful prosecution challenging, and labor intensive.
Fromiti. (n.d.). Organized crime / Cybercrime module 13 key issues: Cyber organized crime activities. United Nations Office on Drugs and Crime. Journal of Advanced Research in Law and Economics, 5(2), 157-170. doi:http://dx.doi.org.ezproxy1.apus.edu/10.14505/jarle…
Classmate 2 Sesan:
Technology has connected nations, and the world has become a global village. Many socio-economic activities in most nations in the world today are aided by electronic systems through the Internet. Since the internet is accessible to all it becomes a fertile ground for cyber criminals to feast on. With recent developments in technology, cyber-attacks are increasing their sophistication; hence it is almost next to impossible to trace the attacks to its source. The availability of cyberspace; the integrity, authenticity and confidentiality of data in cyberspace have become vital questions in this century. Cyber security has become a central challenge for the government at all levels, private businesses, and other organizations as well as the society; both at national and international level. Cybercriminals are often external to the victim, but, one of the three most costly attacks is usually associated with malicious insiders. A typical insider cybercrime would be an employee stealing funds through automated clearinghouse, electronic funds transfer and/or wire transfer. Ultimately, organizations must protect themselves from external and internal threats, and risk. Cyber security incidents include theft of personal information, theft of intellectual property and Government data, hacktivism, denial-of-service attacks, search engine optimization poisoning, social engineering, advanced persistent threat, spear phishing attacks, malware targeting mobile devices and a resurgence of the Zeus Trojan, which targets financial information. Protecting against these attacks is a key challenge for organizations of all sizes for both public and private sectors.
The advent of ‘information age’ has led to positive global impacts like easing barriers to trade, efficiency in communication or sharing ideas, and enhancing the private citizen’s ability to raise awareness for social progress, has also enabled criminal activity to pose serious threats to not only fellow individuals, but massive corporations and governments as well. This presents a ‘serious national security matter’ due to the effects that cybercrime can inflict not only on a nation’s informational security and critical infrastructure, but also on the global economy.
Regarding the international system as a whole, cyber-attacks cause a major stumbling block for global economic growth due to its detrimental effects on innovation and the theft of ideas. Many small businesses without adequate protection are hacked without any knowledge of the act until their sales greatly suffer years later due to competitors gaining knowledge of the company’s logistics, target markets, or personal information. Therefore, as technological advances continue to spur on the efficiency in global commerce, firms must focus on protecting their personal and corporate information from information traders involved in the illicit markets of cybercrime.
Owing to the dangers presented by malicious cyber activity, which also threaten the public safety, as well as the national and economic security, the cyber security agencies must strive to impose consequences against the cyber adversaries through the usage of unique mix of authorities, capabilities, and partnerships. All these are aimed at curbing the activities of criminals and nation-states who believe they can compromise U.S. networks, steal financial and intellectual property, and put critical infrastructure at risk without facing risk themselves. The FBI is the lead federal agency for investigating cyber attacks and intrusions. The agency collects and shares intelligence and engages with victims, while working to unmask those committing malicious cyber attacks and cyber activities.