...------------------------------------------------- Cyber security and its challenges to society Final Project Report Group Members Abdul Majid Qayyum Umair Arshad Hasnat Ahmed Gulraiz Shabbir Contents Introduction: 3 Why is cyber security important? 4 The Impact of Cyber Security 5 The Cultural Impact 5 The Official Impact 5 The Solution Impact 5 Defining Cyber Security 6 Technology & Modern Life 6 What is Cyberspace? 6 What is Cyber Warfare? 6 Cyber is not Hype 7 What Cyber Security Isn’t 7 Cyber-crime 8 Types of Cyber-crimes 8 Hacking: 8 Theft: 8 Cyber Stalking: 9 Identity Theft: 9 Malicious Software: 9 Child soliciting and Abuse: 9 Cyber Bullying 10 Causes of Cyber-crime 10 History of Cyber-crime 10 Cyber-crime in Modern Society 11 Categories of Cyber-crime 11 Individual: 12 Property: 12 Government: 12 How to Tackle Cyber-crime 12 RECENT SURVEY ISSUES ON CYBER SECURITY TRENDS 14 Mobile Devices and Apps 14 Social Media Networking 14 Cloud Computing 14 Protect systems rather Information 15 New Platforms and Devices 15 Everything Physical can be Digital 15 Survey Questions 16 Conclusion 16 Cyber Security and its Challenges to Society Introduction: Over the past several years, experts and policy makers have expressed increasing concerns about protecting internet from cyber-attacks—deliberate attempts by unauthorized persons to access. Many experts expect the number and severity of cyber-attacks to increase over the next several years....
Words: 3707 - Pages: 15
...Computer-Based Crimes INTRODUCTION/PROBLEM STATEMENT Today’s technology has opened up a new realm of criminal activity, and new ways to exploit innocent people. Cyber-related crimes have been increasing for the past decade and include a number of different illegal activities to include: identity theft, phishing, cyber-stalking, and the use of malware. Criminal activities are of course, unethical, and cyber-crimes are no exception. It is a problem plaguing our society, and people have to be diligent to avoid being attacked and exploited. “It seems that everything relies on computers and the internet now — communication, entertainment, transportation (car engine systems, airplane navigation), shopping, and medicine (equipment, medical records). How much of your daily life relies on computers? How much of your personal information is stored either on your own computer or on someone else's system? Cyber security involves protecting that information by preventing, detecting, and responding to attacks” (US CERT, 2013). Today, we’ll look at an ethical approach (Reynolds' Seven-Step Ethical Decision-Making Approach) to develop protective measures that could help in mitigating cyber-crimes Ethically, cyber-crimes really boil down to what’s right and wrong. Deontological theories focus on the right action, doing the right thing, no matter the consequences. All humans on this planet have a deontological duty to do what’s right for fellow man; and committing crimes over the...
Words: 1300 - Pages: 6
...ON CYBER CRIME BY ONUOHA, MAUREEN CHIZOBA C/O MR. DIKE G. OKORONKWO, PLOT 607 MONSTERRADO STREET, (NEAR RUSSEL CENTRE) WUSE ZONE 4, ABUJA, NIGERIA 2348055954286 27TH MAY, 2005 onuchizoba@yahoo.com INTRODUCTION Over the past twenty years, unscrupulous computer users have continued to use the computer to commit crimes; this has greatly fascinated people and evoked a mixed feeling of admiration and fear. This phenomenon has seen sophisticated and unprecedented increase recently and has called for quick response in providing laws that would protect the cyber space and its users. The level of sophistication has gone high to the point of using the system to commit murder and other havoc. The first recorded cyber murder committed in the United States seven years ago according to the Indian Express, January, 2002 “has to do with an underworld don in hospital to undergo a minor surgery. His rival goon hired a computer expert who altered his prescriptions through hacking the hospital’s computer system. He was administered the altered prescription by an innocent nurse, this resulted in the death of the patient”[i] This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations that would help in checking the increasing rate of cyber-crimes...
Words: 2267 - Pages: 10
...Cyber-Crime Trends Melody Ann Lovelace CJA570 October 10, 2011 Ray Gagne Cyber-Crime Trends In the dawn of the 21st century, the evolution of new technology and science concepts have made changes to everyone’s daily life. Cyber-crimes are a creature that did not exist 15-plus years ago. Back in the day, before technology, were only the conventional crimes such as illegal behaviors people thought were criminal behaviors. However, in today’s time an individual must be extremely careful because not only are people combating traditional crimes but cyber-crimes as well. Cyber-crimes are the newest and most complicated crimes for the new century. A cyber crime is an individual conducting actions such as disrupting communications and devices, disrupting networks, Internet, and telephone; both landlines and mobile. Individuals of various ages are committing cyber crimes because these types’ crimes are easier to commit than the traditional kidnapping, murder, or human trafficking. According to Parthasarati (n. d.), cyber criminals fall into one of four categories or groups including children and adolescents between ages six to 18, organized hackers, professional hackers/crackers, and the discontent employee(s). The child or adolescent will partake in such behaviors to prove his or her self superior or outstanding over other individual in his or her age group. The organized hacker will want to fulfill objectives such as political bias and fundamentalism to name a couple. The professional...
Words: 1794 - Pages: 8
...Applications (IJNCAA) 2(1): 127-137 The Society of Digital Information and Wireless Communications, 2012 (ISSN: 2220-9085) Cyber Forensics: Computer Security and Incident Response Virginiah Sekgwathe1, Mohammad Talib2 1 Directorate on Corruption and Economic Crime, Gaborone, BOTSWANA veesek@gmail.com 2 Department of Computer Science, University of Botswana, BOTSWANA talib@mopipi.ub.bw ABSTRACT The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney-laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes objectivity, a precise and well documented analysis, particularly...
Words: 5129 - Pages: 21
...become easier to establish relationships with people from different backgrounds, culture and location. People can sit at home, and learn about another country, their religion, language, way of living, etc without ever visiting the place. Internet proves to be the most helpful tool for all fields. Students use the internet almost always, to study and conduct research for their courses. Doctors and medical students use the web to publish their research papers, findings, different technologies, and cures for various diseases. Cyber attack is a crime that most people do not report When we talk about national security, we talk about the security of over one billion people and sovereignty of a country that is culturally rich, politically stable, socially compact and economically emerging. The worst victim of terrorism and naxalism India and its national security has been threatened recently by cyber crime. They concept of cyber crime is not radically different from the...
Words: 1220 - Pages: 5
...2012 Cost of Cyber Crime Study: United States Sponsored by HP Enterprise Security Independently conducted by Ponemon Institute LLC Publication Date: October 2012 Ponemon Institute© Research Report 2012 Cost of Cyber Crime Study: United States Benchmark Study of U.S. Companies Ponemon Institute October 2012 Part 1. Executive Summary We are pleased to present the 2012 Cost of Cyber Crime Study: United States, which is the third annual study of US companies. Sponsored by HP Enterprise Security, this year’s study is based on a representative sample of 56 organizations in various industry sectors. While our research focused on organizations located in the United States, many are multinational corporations. For the first time, Ponemon Institute conducted cyber crime cost studies for companies in the United Kingdom, Germany, Australia and Japan. The findings from this research are presented in separate reports. Cyber attacks generally refer to criminal activity conducted via the Internet. These attacks can include stealing an organization’s intellectual property, confiscating online bank accounts, creating and distributing viruses on other computers, posting confidential business information on the Internet and disrupting a country’s critical national infrastructure. Consistent with the previous two studies, the loss or misuse of information is the most significant consequence of a cyber attack. Based on these findings, organizations need to be more vigilant...
Words: 9057 - Pages: 37
...MINISTERIAL STATEMENT CABINET OFFICE 25 November 2011 Minister for the Cabinet Office and Paymaster General: The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World ______________________________________________________________________ Francis Maude I have today published the new Cyber Security Strategy for the United Kingdom. I have placed a copy in the Library. The growth of the internet has transformed our everyday lives. But with greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends. This Government has moved swiftly to tackle the growing danger posed by cyber attacks. Our National Security Strategy published last year classed cyber security as one of our top priorities alongside international terrorism, international military crises and natural disasters. To support the implementation of our objectives we have committed new funding of £650m over four years for a transformative National Cyber Security Programme (NCSP) to strengthen the UK’s cyber capabilities. The new Cyber Security Strategy we have published today sets out how the UK will tackle cyber threats to promote economic growth and to protect our nation’s security and our way of life. One of our key aims is to make the UK one of the most secure places in the world to do business...
Words: 930 - Pages: 4
...businesses that are not prepared or tailored to fight. One of the fastest crimes in the United States and all over the world is cyber-crime. Cyber-crimes are the latest and most complex crimes during this age. Cyber-crime is defined as the disruption communication or electronic devices behavior as it relates to network mainframe, Internet, and telephone. Based on reports, individuals of different ages are committing cyber-crimes due to the accessibility of computers and the ease of committed the crime. The plethora of information on the internet has greatly increased the threat to national security. The 21st century internet, coupled with the social networks, has made it very easy for terrorist to communicate enabling them to commit cyber terrorism. Research conducted by the United States Institute of Peace concluded in 1998 approximately 15 terrorist organizations established websites on the internet. That numbered doubled in 2000 and more than quadrupled from 2003 to 2004. Although the research have overwhelmingly proved terrorist websites exit, those who would have an influence on regulating the websites have chosen to overlook them (Weimann, 2004). From 6 February through 14 March 2011, Norton by Symantec Corporation released a Cyber Crime Analysis Report based on an online survey of 19,636 respondents from 24 countries. The report revealed a total of over four-hundred million adults were victims of cyber-crime within a year of the study; which equated to fourteen victims per second;...
Words: 1160 - Pages: 5
...------------------------------------------------- CYBER CRIME IN ITS VARIOUS FORMS ------------------------------------------------- Amneet Bedi ------------------------------------------------- CSE-Dept, RBCENTW Hoshiarpur ------------------------------------------------- e-mail.: amneetb2@gmail.com ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. ------------------------------------------------- Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. ------------------------------------------------- Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly...
Words: 1944 - Pages: 8
...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also gives...
Words: 2796 - Pages: 12
........................................................................................ 2 3.1. Cyber Crime ................................................................................................................................. 2 3.2. Cyber security ............................................................................................................................... 3 4. Key Findings / Discussion of your research topic ............................................................................ 3 4.1. The major risks of cyber security ................................................................................................. 3 4.1.1. To consumers ........................................................................................................................ 3 4.1.2. To businesses........................................................................................................................ 4 4.1.3. IT organisations ..................................................................................................................... 4 4.1.4. Telecommunication companies ............................................................................................. 5 4.1.5. Government ........................................................................................................................... 5 4.2. The origin of cyber security .................................................................................................
Words: 3380 - Pages: 14
...Organized Crime and Cyber-Crime: Implications for Business Phil Williams, CERT® Coordination Center Introduction The capabilities and opportunities provided by the Internet have transformed many legitimate business activities, augmenting the speed, ease, and range with which transactions can be conducted while also lowering many of the costs. Criminals have also discovered that the Internet can provide new opportunities and multiplier benefits for illicit business. The dark side of the Internet involves not only fraud and theft, pervasive pornography and pedophile rings, but also drug trafficking and criminal organizations that are more concerned about exploitation than the kind of disruption that is the focus of the intruder community. In the virtual world, as in the real world, most criminal activities are initiated by individuals or small groups and can best be understood as “disorganized crime.” Yet there is growing evidence that organized crime groups or mafias are exploiting the new opportunities offered by the Internet. Organized crime and cyber-crime will never be synonymous – most organized crime will continue to operate in the real world rather than the cyber-world and most cyber-crime will continue to be the result of individuals rather than criminal organizations per se. Nevertheless, the degree of overlap between the two phenomena is likely to increase considerably in the next few years. This is something that needs to be recognized by business...
Words: 3403 - Pages: 14
...CYBER CRIME IN ITS VARIOUS FORMS Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes. Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism, Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband. Introduction: Today , the world is moving towards a point where everything from banking, stock exchanges, traffic control, telephones to electric power, health care, welfare and education depends on software. Undoubtedly, this advancement and globalization offers many benefits to consumers and businesses but, unfortunately it also offers plenty of opportunities to organized crime. Globalization has promoted and strengthened the economics of illegal activities; offenders have become international entrepreneurs. The Internet provides money and information to all sorts of customers and businesses. It is notably the home of virtual worlds and their economies, which have attracted many people, including criminals. The unholy...
Words: 1930 - Pages: 8
...Need of Cyber Crime Law In India Abstract A Cyber space is a virtual space that has become as important as real space for business, education and politics. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in the India. The digital age has dramatically changed the scope of a crime by adding the electronic component and it comes a new form of science ≴Computer Forensic Science≵. Computer Forensic allows for the evidence of cyber crime to be admissible in court when prosecuting the cyber criminal. In most countries, existing laws are likely to be unenforceable against such crime. Cyber laws, as it stand today, gives rise to both positive & negative consequences. The main negative consequences is the digital soup so vague that many refer to it as the dark sides of technology and that cyber criminal currently have upper hand. The applicability and effectiveness of our existing laws need to be constantly reviewed to face the risk coming from the cyber world. In this paper we are going to firstly describe the computer forensic, cyber crimes, cyber laws of nation & technology challenges. Aim of this paper is to act as a catalyst to raise awareness regarding computer forensic which continues to grow as one of the most important branch of science and help in investigation of cyber crime which continues to grow as one of the most potent threats to the Internet and computer users of the cyber society of...
Words: 2686 - Pages: 11