Free Essay

Common Data Threats and Cybercrimes

In:

Submitted By hardedge79
Words 639
Pages 3
Jove Cook
IS4670 Cybercrime Forensics
Unit 1 Discussion 1
Common Data Threats and Cybercrimes

This paper is to discuss data threats and cybercrimes and the individuals and organizations that are impacted by data exposures using the provided text sheet titled “IS4670: Unit 1 Discussion 1 Common Data Threats and Cybercrimes.” The questions that will be addressed for each example scenario are as follows: What type(s) of data threat and/or cybercrime(s) that played a key role in the data exposure? Who or what the exposure affected? (Such as individuals, corporations, and more.) What are the possible consequences of the data exposures?
Example Scenarios: 1. An E-mail scam asks employees to verify their account settings. When employees respond, they provide their computer user name and password.
Data Threat and/or Cybercrime that played a key role in the data exposure: * Phishing, Social engineering, Spyware/Adware, Uniform resource locator (URL) injectors and browser redirectors, and Viruses.
Who or what the exposure affected: * Organizations that process and store sensitive data, such as government agencies, corporations, e-commerce Web sites, infrastructure organizations, like oil and gas producers and transporters, medical providers, and power plants * Anyone who is gullible, greedy, desperate, uninformed, or inexperienced. * The employees and the corporation they work for.
Possible consequences: * With the employees giving out their computer user name and passwords to an unknown entity, that entity could use that information to commit the following cybercrimes: Hacking, Identity Theft, Intellectual property theft, Software piracy, Spamming, and Transmission of malware. 2. Someone attacks a university computer. He gains access to the records of over 30,000 students and staff members. These records include names, photographs, and Social Security numbers.
Data Threat and/or Cybercrime that played a key role in the data exposure: * Backdoors and trapdoors, Exploits, Keystroke loggers, Logic bombs, Malicious code, Rootkits, Social engineering, Spyware/Adware, Trojan horses, Uniform resource locator (URL) injectors and browser redirectors, Viruses, and Worms.
Who or what the exposure affected: * Anyone who has a bank account or medical insurance can be a target for identity thieves; school-age children can be targets of child exploiters. * Organizations that process and store sensitive data, such as government agencies, corporations, e-commerce Web sites, infrastructure organizations, like oil and gas producers and transporters, medical providers, and power plants. * The University along with its students and staff members.
Possible consequences: * With the use of this type of information an unknown entity could commit various types of cybercrimes such as: Child exploitation/abuse/pornography, Cyberstalking, Cyberwarfare, Extortion, Fraud, Gambling over the Internet, Identity theft, Sale and purchase of narcotics over the Internet, Spamming, and Transmission of malware. 3. A company that processes credit cards stores unencrypted account information on its servers. Attackers gain access to the servers, exposing over 40 million accounts.
Data Threat and/or Cybercrime that played a key role in the data exposure: * Backdoors and trapdoors, Exploits, Keystroke loggers, Logic bombs, Malicious code, Rootkits, Social engineering, Spyware/Adware, Trojan horses, Uniform resource locator (URL) injectors and browser redirectors, Viruses, and Worms.
Who or what the exposure affected: * Organizations that process and store sensitive data, such as government agencies, corporations, e-commerce Web sites, infrastructure organizations, like oil and gas producers and transporters, medical providers, and power plants. * Anyone who has a bank account or medical insurance can be a target for identity thieves; school-age children can be targets of child exploiters. * Anyone who is gullible, greedy, desperate, uninformed, or inexperienced. * The company storing the credit card account information, the credit card companies, and each of the individual credit card account owners.
Possible consequences: * An unknown entity with this information can commit the following cybercrimes: Child exploitation/abuse/pornography, Cyberstalking, Cyberwarfare, Extortion, Fraud, Gambling over the Internet, Identity theft, Sale and purchase of narcotics over the Internet, Spamming, and Transmission of malware.

Similar Documents

Free Essay

Submit a 4 Page Paper Discussing Three Types of Cybercrime Risks and How Organizations and Individuals Can Protect Themselves from These Schemes. Please Identify at Least One Real-Life Exmaple and Provide Details on the Incident.

...Introduction David S. Wall, author of Cybercrime: The Transformation of Crime in the Information Age, once said, “In a nutshell, we are shocked by cybercrime, but also expect to be shocked by it because we expect it to be there, but – confusingly – we appear to be shocked if we are not shocked (if we don’t find it)!” In today’s society, cybercrimes are considered a greater threat than ever. Computer crime can be defined as a crime that is committed where the computer or electronic data device is integral to the criminal act (Kranacher, Riley, and Wells 114). Although many do not believe that they can cause any vital damage, cybercrimes such as wiretapping, piggybacking, and computer viruses can have significant repercussions on various organizations. By identifying the type of cybercrime, discussing how organizations can protect themselves from it, and multiple real-life examples, an insightful analysis of the implications of cybercrime can be better understood. Wiretapping Wiretapping has become a very common way of committing computer fraud. This occurs when perpetrators read information being transmitted between an organization’s computers. In order to decrease this, companies can implement various encryption techniques to help ensure that confidential information does not reach the hands of a person who can use it with malicious intent (Kranacher, Riley, and Wells 120-21). This information that is obtained could be pertaining to an organization’s consumers, employees...

Words: 1097 - Pages: 5

Premium Essay

Hackers and Countermeasures Project Part 1

...The biggest threats, according to the Information Security Forum report for 2016 are concerns with big data, the Internet of Things, cybercrime, and the decreasing number of skilled IT security operators. Another issue that is becoming more prevalent is State Intervention. The threats that we need to prepare for at Aim High College are the protection against cyber threats from hackers, need for stronger protection from inside the organization through a top-notch IT department, and the dangers that come from data sharing. These threats are more common because opening our networks to the vast information on the web, we are opening our networks to numerous threats. Incoming and outgoing data can make our system available for hacking and cyber theft. Without complete transperancy, there isn’t a way to ensure that the data being shared is safe. Without having an IT Department that is on top of the latest threats, there is no way to protect the network from the threats. They need to be aware of all the possibilities of outside threats that can come from under protected or faulty applications. And of course there is the ever increasing number of cyber criminals looking to exploit companies and individuals for monetary gain. Whether they are using viruses and hacking. Or spam and scams, cybercrime is still on the rise. Only by having up to date security and educated employees can you protect the network. Many of these threats will remain constant as the world continues to...

Words: 385 - Pages: 2

Free Essay

Assignment on Cyber Crime

...Title Content page no Introduction…………………………………………………….……………………………….1 What is cybercrime? ..........................................................................................................1 Types of cybercrime……………………………………………………………………………..2 Reasons of cybercrime……………………………………………………………..……………2-3 Offences of cybercrime under ICT Act-2006……………………………………………………3 Penalties of cybercrime under ICT Act-2006 ……………………………………………………4 Cyber Tribunal …………………………………………………………………………………...5 Cyber appellate Tribunal ………………………………………………………………………….5 Recent condition of cyber law in Bangladesh……………………………………………………..6 Recommendations……………………..………………………………………………………….6 Conclusion ………………………..………………………………………………………………7 Bibliography …………….………………………………………………………………………..8 Introduction Information and communications technology (ICT) is often used as an extended synonym for information technology (IT), but is a more specific term that stresses the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information. The phrase ICT had been used by academic researchers since the 1980s, but it became popular after it was used in a report to the UK government by Dennis Stevenson in 1997 and in the revised National Curriculum...

Words: 6414 - Pages: 26

Premium Essay

Cybercrime: Impact on Today’s World

...information within a touch of a button, efficiency in service delivery by the various organizations using ICT among other great advantages derived from using ICT. However, the growth of the information society has been followed by new and serious threats each day. Online fraud and hacking attacks are just some of the examples of computer – related crimes committed on large scale every day. One common definition describes cybercrime as any activity in which computers or networks are a tool, a target or a place of criminal activity. There are several difficulties with this broad definition. It would, for example, cover traditional crimes such as murder, if perchance the offender used a keyboard to hit and kill the victim. Another broader definition is provided in Article 1.1 of the Stanford Draft International Convention to Enhance Protection from Cyber Crime and Terrorism (the “Stanford Draft”), which points out that cybercrime refers to acts in respect to cyber systems (Lewis, 2012). There have been different forms of Cybercrime activities. This includes, but not limited, Denial of Service (DOS) attacks, Malware, and computer viruses. The second class of Cybercrime activities includes, information warfare, phishing, swindles, fraud (Cybercrime, 2012) as well as, cyber-stalking. Computer fraud involves insincere misrepresentations of facts. This could be, altering, destroying and suppressing unauthorized transactions of information. In...

Words: 646 - Pages: 3

Free Essay

Impact of Mobile Information and Communication Technology on Cybercrime

...International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security, Mobile I. INTRODUCTION Information and Communications Technology (ICT) is often used as an extended synonym for Information Technology (IT). ICT is a term that summarizes the role of unified communications networks and the integration of telecommunications (telephone lines and wireless signals), computers and all its form of networks as well as necessary enterprise software, middleware, storage, and audio-visual systems, which enable users to access, store, transmit, and manipulate information to meet day to day needs of the society. A mobile device or mobile ICT basically describes a small, handheld computing device, typically having a display screen with a miniature keyboard and potable enough for users to carry with hands or conveniently kept in a pocket. They are also location independent. In other words their functionality is not confined to a specific geographical location. Nokia, LG, Motorola Mobility, BlackBerry, Samsung, and Apple are just a few examples of the many manufacturers producing these types of devices. A handheld...

Words: 6752 - Pages: 28

Premium Essay

Cyber Crime

...Case Studies of Cybercrime and Its Impact on Marketing Activity and Shareholder Value Katherine T. Smith Department of Marketing Texas A&M University 4112 TAMU College Station, TX 77843-4112 Tel: 979-845-1062 Fax: 979-862-2811 Email: Ksmith@mays.tamu.edu L. Murphy Smith, CPA* Mays Business School Texas A&M University 4353 TAMU College Station, TX 77843-4353 Phone: 979-845-3108 Fax: 979-845-0028 Email: Lmsmith@tamu.edu Jacob L. Smith Grace Bible Church College Station, TX 77845 JacobSmith@grace-bible.org *Corresponding author Forthcoming in Academy of Marketing Studies Journal Electronic copy available at: http://ssrn.com/abstract=1724815 CASE STUDIES OF CYBERCRIME AND ITS IMPACT ON MARKETING ACTIVITY AND SHAREHOLDER VALUE Katherine T. Smith, Texas A&M University L. Murphy Smith, Texas A&M University Jacob L. Smith, Grace Bible Church ABSTRACT Cybercrime, also called e-crime, costs publicly traded companies billions of dollars annually in stolen assets and lost business. Cybercrime can totally disrupt a company’s marketing activities. Further, when a company falls prey to cyber criminals, this may cause customers to worry about the security of their business transactions with the company. As a result, a company can lose future business if it is perceived to be vulnerable to cybercrime. Such vulnerability can lead to a decrease in the market value of the company, due to legitimate concerns of financial analysts, investors, and creditors. This study examines...

Words: 6032 - Pages: 25

Premium Essay

The Effect of Cyber-Crime and One Way to Fight Back

...The effect of cyber-crime and one way to fight back Travis Major Lynn University Jeanette Francis 08 June 2013 The cost of cybercrime to businesses For three years now cybercrime has continued to grow. During this time cyber-attacks have more than doubled, while hitting the financial side with an estimated 40 percent increase. The cost of cybercrime study in 2012, conducted by Ponemon Institute, found that cybercrime costs to a random sample of organizations averaged 8.9 million dollars. This spike is estimated to have increased the cost of cybercrime by 6 percent from 2011 and 38 percent from 2010. Also during this study it was discovered that there had been a huge increase of cyber-attacks, approximately 48 percent, with around 102 of them being successful per week. The number of successful attacks per week in 2010 was only around 50. More than 78 percent of the annual cybercrime can be labeled as denial of service, malicious code, malevolent insiders, and stolen or hijacked devices. Businesses have no choice but to spend an increasing amount of money, time, and energy in order to protect themselves against these cyber-attacks that seem to be reaching unsustainable levels. Even though some companies are finding ways to lower the cost of security measures, the cost of time and energy spent cannot be eased. No matter what the solution is, it will always take time to incorporate any security and energy to maintain those securities. Additional key findings include: ...

Words: 1928 - Pages: 8

Free Essay

E-Security Review

...framework, in light of the quickly evolving threat landscape, is both timely and appropriate. Over the last thirty years there have been dramatic advances in information technology - the development of the microprocessor, the rise of the personal computer, the emergence of the Internet - which have revolutionised the way information is created, stored, shared, and used. Today, powerful, affordable and diverse devices, together with expanding broadband networks, create a powerful opportunity for connectivity for individuals and communities. Over the past two decades, rapid advances in software, IT services, and communications have enabled many traditionally separate and disparate infrastructures and business operations to become more connected. Through this connectivity virtually every aspect of society has experienced a transformation. Businesses and governments have been able to manage and streamline their operations. Individuals have been offered ready access to multiple sources of information thereby expanding knowledge and choice. Across every field of endeavour – commercial, social, scientific and philanthropic – the power of information has been increased and the transaction costs of engagement have been lowered. Our broad reliance on software, services, and communications, along with the benefits they offer, has naturally attracted the malevolent interest of terrorists, criminals, and other sophisticated attackers. To address this threat requires unprecedented cooperation and...

Words: 13936 - Pages: 56

Free Essay

Cyber Crime

...victims. The Australian Institute of Criminology (2011) finds cyber crime to include fraud, hacking, money laundering and theft, cyber stalking, cyber bullying, child sexual exploitation, child grooming and identity theft. The crimes mostly go unreported making it hard to quantify (Australian Institute of Criminology, 2011). However, the most common cyber crime incidents remain malware code and virus attacks that corrupt software. The Australian Cyber crime Act which was assented in 2001 and commenced on 2 April 2002 added new offences streamlined to check on those kinds of cyber crime that impair the security, integrity and reliability of computer data and electronic communications. They are; a) Unauthorized access, modification or impairment with intent to commit a serious offence, b) Unauthorized modification of data where the person is reckless as to whether the modification will impair data, c) Unauthorized impairment of electronic communications. There is a maximum penalty for these offences. Investigation powers relating to search and seizure of electronically stored data have been increased (Find Law Australia, 2012). Culprits of cybercrime can ignore the realms of Australian jurisdiction and launch an attack from anywhere in the world or even design attacks that seem to come from foreign sources. Approaches like this make legal and technical involvement of investigating and prosecuting cybercriminals more difficult. A major problem facing cyber crime investigations involves...

Words: 1001 - Pages: 5

Free Essay

Cyber Crime

...Definition Categories of cyber crime Types of cyber crime Cybercrime statistics Cyber Threat Evolution Cyber crime in Philippines Safety tips Conclusion WHAT DO YOU KNOW? INTRODUCTION • Cybercrime is a term used broadly to describe activity in which computers or networks are a tool, a target, or a place of criminal activity. INTRODUCTION • Examples of cybercrime in which the computer or network is a TOOL of the criminal activity - Spamming and - Criminal copyright crimes, particularly those facilitated through peer-to-peer networks. INTRODUCTION • Examples of cybercrime in which the computer or network is a TARGET of criminal activity • - Unauthorized access (i.e, defeating access controls), • - malicious code, and denial-of-service attacks. INTRODUCTION • Examples of cybercrime in which the computer or network is a PLACE of criminal activity - theft of service (in particular, telecom fraud) and - certain financial frauds. BRIEF HISTORY • The first recorded cyber crime took place in the year 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. DEFINITION • Cyber Crime is a Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is nothing but where the computer used as an object or subject of crime. DEFINITION • Cybercrime is any illegal act committed using a computer network...

Words: 1366 - Pages: 6

Free Essay

Russian Patriotic Hacking

...Russian Patriotic Hacking During Operation Allied Force Introduction. With the increasing number of cyberattacks, many security professionals are greatly troubled by the real threat to the information technology infrastructure in the United States. While safeguarding information has been a major issue for the private and public sectors since the beginning of the computer era, the increased level of concern over the most recent attacks has resulted in devoting more resources to combat this threat. This paper analyzes numerous cyberattacks by Russian computer enthusiast group Chaos Hackers Crew and other hacktivists during Operation Allied Force in 1999, that included taking down and defacing various NATO and US Government websites, several successful virus propagation attempts on military servers and countless spamming storms. This particular case raises curious questions about the legal definition of term cyberconflict itself, magnitude of the damage from a potential cyberattack on U.S. Government by terrorists and the level of preparedness of key military and intelligence units for the cyberwar. The cyberterrorism threat is real, however it’s essential to recognize that preserving the state of continuous distress over computer vulnerabilities can be profitable. Based on this research, cultural differences play a huge role in the world of computer hackers who decide what entity to attack and how, also the scale of a cyberattack doesn’t matter as economic damage can be devastating...

Words: 8586 - Pages: 35

Premium Essay

Cybercrimes & Supply Chains

...UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE | The Impact of Cybercrimes on Organization Supply Chains | ASCM 630 Research Paper | TurnItIn Originality Score: 27% | April Dorsey | 4/1/2012 | The paper must follow APA format, be written on an approved topic related to the course, and include discussion of how the topic relates to Acquisition and Supply Chain Management. The paper must list and discuss a minimum of 10 scholarly references (other than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. | ABSTRACT This paper will discuss the impact of cyber crimes on organization supply chain functions, and steps taken to improve supply chain security. Cyber crimes include, but are not limited to, piracy, implanting viruses, netspionage, and credit card fraud. During these times, it is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at bigger risk is procurement. Majority of companies use other businesses outside their own, like manufacturers and distributors, as part of their purchasing...

Words: 5220 - Pages: 21

Premium Essay

Modern Day Attacks Against Firewalls and Vpns

...attacks are on the rise and no system or device is immune. Many organizations employ multiple layers of firewalls but that doesn’t completely eliminate the threat. Attacks against firewalls and virtual private networks or VPNs are constantly being exploited with new methods everyday, but they are yet another obstacle that a cyber criminal must overcome. First let’s discuss what a firewall is and what a firewall is capable of doing. Firewall applications are normally used to protect and secure private networks. A network can have a software, hardware or both firewalls installed and they provide the “ability to control in-bound and outbound traffic”, according to Pirc of Sans Technology Institute (para 2, nd). Most Microsoft operating systems today come with a firewall installed and Microsoft suggests that you should have a firewall set up on each system in your home, even if you have a hardware firewall such as a router that has security policies adjusted, this can help prevent any malicious activity from spreading across your home network. Most firewalls contain a variety of policies but they all at the very least have the same basic policies that can be set up. There are 3 common policies that you will find and these are; Packet filtering, proxy service and stateful inspections. Packet filtering basically analyzes data and crosschecks it with the policies that will either allow or deny the transmission of information in or out of the network. Proxy service is a service which...

Words: 2441 - Pages: 10

Free Essay

Cyber Crime

...Cybercrime Name Institutional Affiliation Date Cyber Crime a 21st Century Problem Abstract Subsequent research has focused in establishing Cybercrime as an activity only for computer programmers. However, Cybercrime has recently expanded to appear as a full capital offense since it integrates multiple forms of criminal activities. Per se, Cybercrime has proved to be a social, economic, and political form of disturbance, or in other words, a mother of 21st century crimes. The commencing research will endeavor to prove that Cybercrime should be managed in a more responsive method since it encourages the development of other crimes. The research is defragmented into three main sections, firstly, a background establishing the crude nature of Cybercrime. Secondly, the research will provide a critical review of forms and the extent of crime. Thirdly, the research will provide the authors opinion on what should be done in relation to Cybercrime. Background Half a decade ago, when computers were evolving to their current state, little was known of any criminal activity, which could have been associated with the process. However, with time, Cybercrime grew leading to the introduction of malicious activities that attempts to swindle the information wealth of the user. In recent times, most countries, even in the developing world are processing laws, which should mitigate or even extinguish Cybercrime. Cybercrime is one of the most sophisticated crimes since the attacker is remotely...

Words: 699 - Pages: 3

Premium Essay

Cyberthreats

...Cyber threats Randi Titzer BCC/403 April 10, 2016 Bobby “Robin” Kemp Cyber Threats A cyber threat is a possibility that a malicious attempt has been made to damage or disrupt a computer network or system. Cyber threats happen all over the world to all people. It doesn’t matter your race, religion, national origin, ethnicity, gender or sexual orientation. Cyber threats can be in various forms, such as what we will be discussing later on in the readings. We will discuss hacking of financial institutions, security issues, downloads/applications, etc. Each of these have serious consequences and can cause harm to the businesses and members of these businesses and/or owners of these accounts. Identify cyber-related threats that emerged from existing global technology There are several types of cyber threats that have emerged from existing global technology. Some of these threats that I will discuss have not only had past effects on society as a whole, but they will also have some severe future effects on society too. The first threat that we are going to discuss is the security issues occurring with mobile devices, computers, etc. One example of this is the issue with the FBI and Apple. The FBI couldn’t get into an Apple iPhone of a supposed terrorist because the phone was encrypted. Apple would not help the FBI gain access to the iPhone and this is...

Words: 729 - Pages: 3