...A Case Study of the Trend in Cyber Security Breaches as Reported by US Federal Agencies Joash Muganda American Public University System ISSC640 – Prof. Belkacem Kraimeche November 12, 2014 Abstract The cases of cybersecurity breaches reported by federal agencies have sharply increased in recent years due to a combination of factors. This study seeks to examine the current trends in cybersecurity breaches documented and reported by federal agencies, analyze the various factors responsible for this trend and their impacts, as well use currently available data to predict a future trend. A Case Study of the Trend in Cyber Security Breaches as Reported by US Federal Agencies The number cybersecurity breaches reported by federal agencies has been on the increase owing to the variety of factors. According to a report by U.S Government Accountability Office, GAO (2014), federal agencies have reported increasing number of cybersecurity breaches that have put sensitive information at risk, with potentially serious impacts on federal and military operations. GAO (2014) further stated that the increase in this number is due to the fact that obtaining hacking tools has become easier, there is dramatic increase in reporting security incidents, and steady advances in the sophistication and effectiveness of attack technologies. The table below shows the number of cybersecurity breaches since 2006 to 2012 as reported by GAO (2014). Number of Incidents | 5503 | 11911 |...
Words: 987 - Pages: 4
...Cyber Security by American Military University Professor Derrick Thomas June 22, 2014 Cyber security is a difficulty that everyone faces in today’s society. It is defined in a variety of ways by many. One definition is that cyber security focuses on protecting computer networks, systems, data, and programs from unwanted access. Cyber security is sometimes referred to as information security, information network security, cyberspace security, or even computer security. There are many viewpoints by highly educated people on cyber security but the purpose of this paper is to tell my viewpoint on the subject. Every aspect of a persons life has some sort of cyber dimension. People paying for bills online, cloud computing, and even online gaming. This year in 2014, everyone is bombarded with news headlines that say cyber threats are up. Many of these headlines always include some kind of phishing attack trying to steal someones identity, a hacker that breached the network of a company, a new technique that attacks mobile devices like smart phones, or a government trying to monitor and take secrets from another government!!br0ken!! The concern for cyber security is now a real-world concern globally. The concern over cyber security is what is driving the governments worldwide to make it priority one on their list's now. This is so, because technology is growing at a very fast and continuous pace. The technology field itself is very vast and has much variety. Cyber security...
Words: 4041 - Pages: 17
...Research Proposal on RECENT TREND OF CYBER CRIME IN BANGLADESH : LAWS AND PRACTICES GOLAM RABBANI Student of LLM Roll 10119032 Department of Law Rajshahi University BANGLADESH E-mail: g.rabbani.law@gmail.com Recent Trend Of Cyber Crime In Bangladesh : Laws & Practices INTRODUCTION The development in information technology and electronic media especially from 1980`s onwards have given raised to a new variety of computer related crimes which are commonly called cyber-crime. The cyber-crime may be done by using computer only, but this crime may be done very easily by using internet. Cyber crime or computer crime refers to any crime that involves a computer and a networks. Some authorities feel that the term cyber-crime is misnomer as this term is nowhere defined in any statutes or act enacted by the Parliament. In a sense is radically different from the concept of conventional crime in so far as both include conduct whether act or omission which causes breach of law and therefore, it is punishable by the state. It is not surely said that, from when the cybercrime was started but in 1999 at Tywan a virus was attracted named CIH, made the topic of cyber-crime familiar to the whole world. In the present time people become more dependent on computer and internet, as result, we can’t not think our daily activities without this technological help. For this reason, some self-gainer people chose this technological way...
Words: 1924 - Pages: 8
...The effect of cyber-crime and one way to fight back Travis Major Lynn University Jeanette Francis 08 June 2013 The cost of cybercrime to businesses For three years now cybercrime has continued to grow. During this time cyber-attacks have more than doubled, while hitting the financial side with an estimated 40 percent increase. The cost of cybercrime study in 2012, conducted by Ponemon Institute, found that cybercrime costs to a random sample of organizations averaged 8.9 million dollars. This spike is estimated to have increased the cost of cybercrime by 6 percent from 2011 and 38 percent from 2010. Also during this study it was discovered that there had been a huge increase of cyber-attacks, approximately 48 percent, with around 102 of them being successful per week. The number of successful attacks per week in 2010 was only around 50. More than 78 percent of the annual cybercrime can be labeled as denial of service, malicious code, malevolent insiders, and stolen or hijacked devices. Businesses have no choice but to spend an increasing amount of money, time, and energy in order to protect themselves against these cyber-attacks that seem to be reaching unsustainable levels. Even though some companies are finding ways to lower the cost of security measures, the cost of time and energy spent cannot be eased. No matter what the solution is, it will always take time to incorporate any security and energy to maintain those securities. Additional key findings include: ...
Words: 1928 - Pages: 8
...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...
Words: 6414 - Pages: 26
...A Case of Bureaucracy If you had told someone ten years ago, that it would be possible to feign an outright physical attack on a country through computers, they would have laughed at you and called you a madman. The sad truth is that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer...
Words: 2734 - Pages: 11
...A Case of Bureaucracy If you had told someone ten years ago, that it would be possible to feign an outright physical attack on a country through computers, they would have laughed at you and called you a madman. The sad truth is that this form of violence and terrorism, aptly called cyber terrorism, is no more a thing of the past and is very much possible in our technological and computer savvy world of today. The economic growths achieved by many countries due to such technological advancement in fields of computers such as networking. Networking has provided the world with the Internet that has bridged the distances of the world and made it into a global village. People can now use the Internet to share information with each other. Internet can also be used as a communication tool and people sitting in places half way across the globe can communicate with each other with a click of a button. At the same time, the Internet can also be a dangerous place. People share information through their computers and this means that their computers are online in a cyber world. This means that the person’s computer is open to threats and risks from anyone who knows how to get inside the computer. People can use the Internet to steal someone else’s credit card numbers, and a lot of other personal information. In this paper, we shall examine how people can use the Internet to spread a new form of terrorism, cyber-terrorism. A person sitting at home using his personal computer can longer...
Words: 2737 - Pages: 11
...2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report 2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: United States, which is the third annual study of US companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 56 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For the first time, Ponemon Institute conducted cyber crime cost studies for companies in the United Kingdom, Germany, Australia and Japan. The findings from this research are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Consistent with the previous two studies, the loss or misuse of information is the most significant consequence of a cyber attack. Based on these findings, organizations need to be more vigilant...
Words: 9057 - Pages: 37
...Brandon Kabbash Professor James Rhea IS 3100 15 November 2012 Case Study 6 1. Read the “Thinking Exponentially” Guide on pages 194-195. Keeping the principles of that guide in mind, list five possible commercial applications for mobile WiMax. Consider applications that necessitate mobility. After reading the case study, I firmly believe that five potential commercial applications of mobile WiMax would be to create a quicker, faster and stronger wireless network, better use and integration of cell phones in automobiles and other forms of transportation, an easier means to start or create networks, bringing wireless internet to more public places, and to improve in video messaging and email. 3. Clearwire went public in March 2007 at an initial price of $27.25. As of April 2010, the price was $8.00. Go Online and research the company to find out what happened to its share price. Explain why its share price has dropped. Clearwire’s share price dropped from $27.25 to $8.00 in 2007 because Clearwire and Sprint merged their wireless broadband unit into sprint’s 4g WiMax network with Clearwire’s WiMax broadband network. 4. AT&T and T-Mobile have endorsed HSDPA, but it does not have the same potential maximum transmission rates. Rather than jump on the WiMax bandwagon, those companies plan to deploy a different technology called Long Term Evolution (LTE). Search the Web for LTE versus WiMax comparisons and compare and contrast these two technologies. Long Term...
Words: 529 - Pages: 3
...CYBER TERRORISM Table Of Contents Section Page Abstract----------------------------------------------------------3 Introduction-----------------------------------------------------4 Premise----------------------------------------------------------5 Research Methodology----------------------------------------5 Research Results-----------------------------------------------6 Critical Analysis------------------------------------------------9 Conclusion-------------------------------------------------------30 Appendix---------------------------------------------------------31 Bibliography----------------------------------------------------56 Abstract FBI cyber security division computers are hacked into at the same time that known hackers capable of performing this have their computers hacked into and are blown up when they hit certain keys on their computer keyboards. Traffic lights and the transportation systems are then hacked into and total gridlock and chaos ensure. Wall Street is then affected and cyber money is thought to be dwindling away. This is known as a Fire Sale which has 3 steps. In the first step transportation is shut down then finance and finally, in the third step, utilities are affected. As expected, the media broadcast the government’s next move to everyone including the terrorists. As it turns out, the leader of the terrorists is a former DOD software programmer that had warned...
Words: 4562 - Pages: 19
...Weak USA Cyber Policy vs China’s Security Threat to the USA? Abstract A cyber spy network based mainly in China hacked into classified documents from government and private organizations. One of the biggest questions still remains unanswered. Should the U.S. Congress conduct an in depth assessment of Chinese cyber spying and consider imposing tougher penalties on companies that benefit from industrial espionage. In this paper I will review china’s cyber threat and possible USA solutions to protect against the threat. Could Weak USA Cyber Policy be the cause of China’s Security Threat? U.S. corporations and cyber security specialists have reported an daily attack of computer network intrusions originating from China. Of the seven cases that were adjudicated under the Economic Espionage Act in 2010, six involved a link to China. U.S. corporations and cyber security specialists have reported a huge increase of computer network intrusions originating from China. Some of these reports have alleged a Chinese corporate or government sponsor of the activity, but the U.S. intelligence community has not been able to confirm these reports. In a study released in February, McAfee attributed an intrusion attempt they labeled Night Dragon to a Chinese Internet Protocol (IP) address and indicated the intruders stole data from the computer systems of petrochemical companies (Minnick, W. 11 Dec, 2011).” So could the problem be U.S. Cyber policy? I believe congressional committees...
Words: 793 - Pages: 4
...Fort Worth Police Department The Fort Worth Police Department was chosen to be a part of this study because it is one of the larger local departments and also in the vicinity of the Texas Christian University. According to the Texas state directory, Fort Worth is one of the 10 largest cities by population, with a population of 781,000 people (Texas State Directory). Fort Worth has been chosen for this study due to the geographic location and ability to conduct interviews in person with the computer crime detectives. The Fort Worth Police Department consists of several different divisions and units such as beat patrol, narcotics, SWAT (Specialized Weapons And Tactics team) and a VICE team which generally works with a combination of offenses...
Words: 2338 - Pages: 10
...[CRIMES IN CYBER CAFÉ AND ITS RULES AND RAGULATION] The study investigates the cyber café rules around Bangladesh: law and reality. It evaluates whether the guideline for cyber café owners’ and users are properly maintained or not. This study also reveal how crime occurred on the cyber café and why and it also investigate whether the guidelines are sufficient or not. At last this study recommend some point by which we can maintain our cyber café institution properly and by how we can reduce crime occurred on the cyber café. Index Abstract ………………………………………………………………………...………. 2 2 2 2 2 2 2 2 3 5 5 5 5 6 7 8 8 9 13 14 17 17 19 1. Introductory part ………………………………………………………….……..…. 1.1 Aim of the study ……………………………………………….……….... 1.2 Object of the study ……………………………………………...……….. 1.3 Methodology ……………………………………………………….......... 2. Definition ………………………………………………………………….….......… 2.1 Cyber café ……………………………………………………….……..... 2.2 Necessity ……………………………………………………………….... 3. Amount of cyber café around Bangladesh …………………………………..………. 4. Law regarding cyber café ……………………………………………………....…… 4.1 BTRC ………………………………………………………………...….. 4.2 CCOAB …………………………………………………………….…..... 4.3 Guidelines ……………………………………………………….…..….... 4.4 Law and its Reality……………………………………………………...... 4.4.1 Reality in Dhaka………………………………………....… 4.4.2 Reality on other area ……………………………………..... 5. Crime in cyber café …………………………………………………………............. 5.1 Case study regarding crime in cyber café …………………………….…. 6. Case study …………………………………………………………………...
Words: 6680 - Pages: 27
...Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value Katherine T. Smith Department of Marketing Texas A&M University 4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study examines...
Words: 6032 - Pages: 25
...Any Topic (writer's Choice) YourFirstName YourLastName University title Cyber Security: Computer Hacking Abstract Computer hacking incidences have dramatically increased over the years. However, the current federal laws, such as the Computer Fraud and Abuse Act, have performed dismally in deterring potential cyber hackers. This paper explains that there are a very small percentage of computer hackers who are ever caught and prosecuted. This is the case since most companies, which are victimized by computer hackers, opt to hide the issue from the public and relevant authorities to maintain their position in the market. This paper explains the factors which encourage hacking by basing its arguments on formal psychological theories and informal observation. The review also explains the difference between malicious hackers and those who do it with good intentions. Business organizations today are hiring ethical hackers for the purpose of protecting themselves from the malicious ones. This paper also addresses police strategies for combating cyber hacking and also gives a comprehensive approach to reduce teenage hacking proclivity at an early stage. In countering this issue, law enforcement should apply previously done researches together with the current ones for maximum results. Keywords: computer hacking, business organizations, ethical hackers, law enforcement ...
Words: 4342 - Pages: 18