Free Essay

Trends of Cybercrimes

In:

Submitted By ashleyablair
Words 1962
Pages 8
The Future of Cybersecurity
LaToya Crook
BCC/403
October 26, 2015
Professor David Pettinari

The Future of Cybersecurity
The world in which we live is becoming more socially connected than ever before. It seems that technological advances have met, if not exceeded, anyone's expectations as new ways to communicate continue to develop. Due to the innovations of mobile connections, global technologies, and the ominous cloud, information can be shared and accessed at the touch of a screen or the sound of one's voice. Digital equipment that were unheard of just five years ago now inundates both professional and personal arenas. As a result, organizations, as well as their employees, have begun to feel the pressure placed on them to address current and potential threats to the security of their systems and clients (CloudTweaks, 2013).
Cybercriminals can retrieve and analyze information gained through technological access from a single business or entity and use such confidential data to give competitive advantages to other organizations, to satisfy the requests of influential individuals, or to benefit national security. The World Wide Web permits immediate and boundless communication and the ability to interface on a global level, which can have its downfalls just as much as its benefits. Unapproved access to, and abuse of, information, technology and fundamental systems can irreparably damage a person or organization’s character, financial status, sense of stability and, in specific instances, physical well-being. Cyber attacks are becoming more frequent, more complex and more effective as hackers develop new ways to reach a greater number of victims. Due to the anonymous nature of crimes related to cyber attacks, every person, organization and nation are potential victims. It is unavoidable. What would we be able to do to secure ourselves? What can associations do lawfully and for all intents, in a viable and inexpensive way, to shield themselves from online attacks and seek retribution (BakerBotts, 2012)? Present-day discussions persist around the strategies and actions necessary to shape the future of cybersecurity.
Cybersecurity, the Government and the Private Sector
Due to the overwhelming ability of cybercrime to cause damage on an international level, adequate security will require national and international intervention. The Federal Bureau of Investigations is a prime example of the national effort made by the United States to create interagency collaboration. This governmental entity can connect with others on a global scale to conduct investigations beyond the American border. It will become necessary for all countries to uphold the future endeavors of intelligence agencies such as this to identify and thwart future attacks and threats against any country (Robinson, 2013). Simply responding to technology-based attacks is now considered an antiquated concept because indicting the guilty parties after the damage is no longer the objective. Prevention is the key to combatting cybercrime. Admittedly, staying even one step ahead of cybercriminals will take more than just the work of one governmental initiative. Other international organizations, for example, the North Atlantic Treaty Organization and the European Union are also joining forces to effectively guard the nations. The thought that the best safeguard is to attack first is significant to the eventual fate of proactively battling cybercrimes (Robinson, 2013).
Nevertheless, there still exists no standard blueprint for policies against cybercrime because different national security endeavors are advancing independently. In the United States, the National Institute of Standards and Technology is making the Cybersecurity Framework. The framework consists of a voluntary list of recommendations for the security of critical infrastructure (Robinson, 2013). The European Commission is developing the Network and Information Security Platform. Furthermore, as countries create methodologies for securing cyberspace, there is a danger that unaligned strategies could make a divided or inadequately secured worldwide base. A few contrasts among national approaches are inescapable. Cybersecurity must differ from nation to nation because every country confronts its unique set of threats and needs that reflect those risks. In response to the need to develop a universal framework by which strategies can cooperate, Microsoft has created a whitepaper titled Developing a National Strategy for Cybersecurity (Jackson, 2013). This document focuses on creating a basis for best practices through the identification of fundamental security measures that can benefit all nations (Jackson, 2013).
Legal Limitations
The Department of Justice is responsible for the prosecution of cyber criminals on a national level. The FBI works with other federal law enforcement agencies to conduct investigations related to cybercrime. The mission of the FBI against cybercrime consists of four objectives. The first task is to stop perpetrators of the most damaging computer invasions and those who spread “malicious code” (Snow, 2013). Secondly, efforts will be made to identify and catch sexual predators who utilize the Internet to encounter and exploit children and to create, save, or share illicit pictures and videos of children. The third objective is to neutralize operations that threaten national intellectual property, which could jeopardize our national security and offer other nations a competitive advantage against us. Lastly, the FBI seeks to destroy national and transnational organized crime that uses the Internet to commit fraud. To this end, they have set up “cyber squads” in each of 56 field offices across the nation, with more than 1,000 trained specialists, experts, and digital forensic analysts. Still, this is not a job for a singular department.
Many of the best instruments the FBI possesses for addressing any crime issue are its long-standing associations with law enforcement agencies from the international all the way down to the local level. This collaboration also includes the private sector and educational institutions. At the government level, and by presidential command, the FBI drives the National Cyber Investigative Joint Task Force (NCIJTF) as a multi-office national point of convergence for planning, incorporating and sharing applicable data identified with cybercrime investigations to identify and locate the offender. The task force also looks for intent, motive, capacity, collaborators, financial supports, and the techniques used by both groups and people who commit cybercrime. By doing this, allies of the NCIJTF support the full scope of choices provided by U.S. government over all components of national power.
One recent case of coordination indicates how successful we are when functioning inside of these firmly established associations. During the past year, the Romanian legal system led one of the country's biggest police activities ever—an investigation into an organized crime group engaging in Internet fraud. The examination sent more than 700 law enforcement officers who performed searches through 103 areas, which prompted the capture of 34 individuals. American victims accounted for more than 600 of those who suffered from this particular crime ring. A large part of the success in dismantling this group of cybercriminals depended on the strong collaboration between Romanian law enforcement and the U. S. government, state and local partners. The far-reaching coordination of FBI's legal representative in Bucharest allowed the Romanians to access more than 600 complaints collected by the Internet Crime Complaint Center from entries to the www.IC3.gov reporting portal. Likewise, more than 45 FBI headquarters assisted with interviewing victims to obtain statements and police reports to transcribe them to Romanian complaint forms. This investigation was also due to the work of the legal representative (Snow, 2013).
Another viable collaboration in the war against cybercrimes suggests collective endeavors between IT security companies such as security merchants and law enforcement. Security analysts can effectively share vital insight to security threats or data required by police to direct their investigations. One of the potential approaches to identify and prevent attacks in a timely manner is with a custom defense plan that can caution IT staff of anything harmful event in the system. Analysts have been working together with law enforcement agencies, guiding their investigations, keeping in mind the end goal to obstruct cybercriminal operations and thereby, prohibit losses against clients and corporations.
The Prevention of Cybercrime
The most significant effort in the fight against cybercrime is prevention. Cybercrime is not like any other crime. By the time law enforcement officials have identified the crime and the offender, it is often too late. Too many people have already been impacted by the commission of the crime, or the perpetrator has moved on to another venture. To the advantage of law enforcement, crime follows specific trends and tends to deviate very little from the patterns, even in the cyber world. To this effect, investigators can formulate strategies to analyze and prevent cyber threats (Preventing and recovering from cybercrimes, 2014).
The public must be made aware of the risks associated with the use of cyberspace to make prevention methods effective. Each person who possesses and uses a device has to know the possible threats and should be educated about best practices against being victimized. Moreover, jurisdictions must be willing to share vital information that could lead to the capture of cybercriminals or groups before others are victimized.
Because most business threats are internal, education and training are important factors when discussing workplace security. It is crucial for staff beyond the scope of the IT team to understand their role in implementing the organization’s security policy. Not only should employees know what to do in case of a breach, but employee involvement requires a clear understanding of what qualifies as a breach of security and what violates ethical practice in the use of business-owned devices. Prevention is enforced by predicting the risk to all possible resources and processes from company phones to computer emails. All aspects of internal and external communication components must be assessed on a periodic and ongoing basis. Ideally, collaboration between law enforcement, federal agencies and the private sector through shared information can go a long way in preventing attacks on any one individual or group.
The Internet not only permits easier access to people and information for our luxury, but it also allows others direct access to our lives and businesses for their own purposes. Given that fact, cybercriminals will continue to find new ways to infiltrate confidential accounts and information in hopes of carrying out their personal agendas. Paul Nicholas, the Senior Director of Microsoft Global Security Strategy and Diplomacy hypothesizes that the risks are not just from commonly recognized sources, such as malware, viruses, and other cyber attacks, but from unsupported policies as well. The nation's response to international cooperation to resolve cyber conflict will shape the future of cyberspace for all nations (Trustworthy Computing, 2014). Cybersecurity is an essential aspect of protecting society from the ever-developing threat of technology. As modern technology increase so does the criminal entity that makes up cybercrimes that reach beyond the boundaries of any nation. Cyber attacks such as security intrusions, identity theft, fraudulent social media, and phishing are weakening critical infrastructure. Therefore, law enforcement and intelligence agencies like the Federal Bureau of Investigation and Homeland Security must work together to combat and conquer cyber attacks, share the most useful tools and practices, and develop policies that will reach across nations to prosecute cybercriminals.

References
Botts, B. (2012). The future of cybersecurity: threats and opportunities. Retrieved from Cybersecurity Brochure: http://files.bakerbotts.com/file_upload/documents/CyberSecurityBrochure.pdf
CloudTweaks. (2013). The Future of cybersecurity. Retrieved from CloudTweaks: http://cloudtweaks.com/2015/06/the-future-of-cybersecurity/
Jackson, W. (2013). Cybereye. Retrieved from GCN: https://gcn.com/blogs/cybereye/2013/10/global-cybersecurity.aspx
Preventing and recovering from cybercrimes. (2014, November). Retrieved from The State of Security: http://www.tripwire.com/state-of-security/incident-detection/preventing-and-recovering-from-cybercrime/
Robinson, N. (2013). Cybersecurity Strategies Raise Hopes of International Cooperation. Retrieved from Tangled Web : http://www.rand.org/pubs/periodicals/rand-review/issues/2013/summer/cybersecurity-strategies-raise-hopes-of-international-cooperation.html
Trustworthy Computing. (2014). Cybersecurity. Cyberspace 2025: Today's Decisions, Tomorrow's Terrian. Retrieved from http://www.microsoft.com/security/cybersecurity/cyberspace2025.

Similar Documents

Premium Essay

Trends in Cybercrime-"Sextortion" in Teens and Children

...Trends in Cybercrime-“Sextortion” in Teens and Children Curtis M. Styles CJA/570 April 23, 2012 Ray Gagne Trends in Cybercrime-"Sextortion" in Teens and Children Electronic methods of committing crimes in society today, is generally a new phenomenon. Modern crimes directed against the operation of computer technology itself, presents new crimes that are as new as contemporary technology. The Internet has opened a variety of new rooms for cybercriminals to commit cyber-based terrorist attempts, computer intrusions, and major cyberfrauds. Cyberextortion is an outsider threat designed to obtain money, products, or favorable considerations from an organization or individuals by using illegal means of persuasion related to computer intrusion (Cybercrime Investigation & Intelligence, 2012). This paper addresses the relatively new form of sexual exploitation called “sextortion” that has emerged on the cybersex crime scene recently, and its affect upon teenagers and children. In addition, the paper addresses the dangers of scams associated with “sextortion”, its criminal profile, law enforcement initiatives to combat “sextortion”, and the penalties for committing these types of crimes. “Sextortion” is a method of sexual exploitation in which individuals are extorted with nude images of themselves shared online over the Internet. Texting has become the modern day method of communication among teens and children, and in the case of “sextortion” these images are displayed...

Words: 2163 - Pages: 9

Free Essay

A Case Study of the Trend in Cyber Security Breaches as Reported by Us Federal Agencies

...A Case Study of the Trend in Cyber Security Breaches as Reported by US Federal Agencies Joash Muganda American Public University System ISSC640 – Prof. Belkacem Kraimeche November 12, 2014 Abstract The cases of cybersecurity breaches reported by federal agencies have sharply increased in recent years due to a combination of factors. This study seeks to examine the current trends in cybersecurity breaches documented and reported by federal agencies, analyze the various factors responsible for this trend and their impacts, as well use currently available data to predict a future trend. A Case Study of the Trend in Cyber Security Breaches as Reported by US Federal Agencies The number cybersecurity breaches reported by federal agencies has been on the increase owing to the variety of factors. According to a report by U.S Government Accountability Office, GAO (2014), federal agencies have reported increasing number of cybersecurity breaches that have put sensitive information at risk, with potentially serious impacts on federal and military operations. GAO (2014) further stated that the increase in this number is due to the fact that obtaining hacking tools has become easier, there is dramatic increase in reporting security incidents, and steady advances in the sophistication and effectiveness of attack technologies. The table below shows the number of cybersecurity breaches since 2006 to 2012 as reported by GAO (2014). Number of Incidents | 5503 | 11911 |...

Words: 987 - Pages: 4

Premium Essay

Trends Evaluation

...Criminal Justice Trends Evaluation Jazmine I. James CJA 394 April, 07, 2014 Marilyn West Criminal Justice Trends Evaluation There are many trends; future and past in the interfaces between components of the criminal justice system and criminal justice connections with surrounding society. It is very important to understand past, present and future trends throughout the criminal justice system in order to better handle and address them better. Some trends have been known to affect the criminal justice system in a negative way instead of in a positive way. For many the criminal justice system plays a major role in how society changes and how society values criminal justice in this era. The purpose of criminal justice and the law is to protect society from harm and ensure their safety as well as to protect the innocent and punish those guilty of committing a crime but at the same time doing so without violating their rights. As the world evolves, new laws have to be set in place to keep up with the evolution of criminal justice and crimes. New trends and contemporary issues can develop in society and can also have a direct impact on the criminal justice system. Technology is one of the biggest trends in the world that continues to improve on a daily basis and make life easier but complex at the same time. Technology affects the criminal justice system and will continue to do so every day because it creates a new category of crimes that can and are being committed...

Words: 1186 - Pages: 5

Premium Essay

Crimes

...Introduction Cybercrimes are steady trending and hitting the main stream as an epidemic for conventional criminal offenses. Within cyber crimes deception, embezzlement, blackmail, identity theft, and identity fraud are some well known crimes. According to Controlling cyber-crime and gambling: Problems and paradoxes in the mediation of law and criminal organization:​ The main elements explaining computer crime and its organization may be found within the illegal activity and the socio-legal problems confronted there. This explanatory approach emphasizes: (a) that at a given stage of technological development, a given illegal act presents certain technical and social problems which must be negotiated for its successful completion; (b) that we can identify the most efficient types of organizations for managing those problems; and (c) that the existence of these kinds of organizations are explained in terms of their technical efficiency in the situations at hand and in their ability to avoid, evade, and neutralize the efforts of law enforcement (McMullan, 2007). There is a lot to say about cybercrimes and the sociology of but, this paper will cover what is trending in cyber crimes. Some trends are organized criminal activity and others are individualized. Organized cybercrimes Organized criminal groups have adopted the trend of technology within their criminal activity. They have placed a value on information and communication technology​They a have used the technology to...

Words: 634 - Pages: 3

Premium Essay

Understanding Cyber Crime: a Sociological Study Among the Students of University of Dhaka

...Cyber and technology related crime is on the increase and current trends indicate that itwill be a significant issue in Bangladesh. It has already been seen that a glomming threatbecomes visible in the arena of information technology. Recently the hacking of RABwebsite and e-mail threats of former prime minister are example for few of them.In contrast, cybercrime is becoming a threat to government itself. Due to lack of necessary legislation to tackle such type of crime, cyber criminals are almost in the safeside to commit such crime. In the Information and Communication Technology Act.2006, there are several clauses against cybercrime. But this Information andCommunication Technology act is not the concert one. By enacting this act, there is achance to become safe side after committing crimes. So, considering these facts acomprehensive Cybercrime Protection Act should be imposed.This report incorporates the impacts of cybercrime in Bangladesh especially focuses onthe area of Personal life, Workplace as well as Policy making Bodies or thinkers. Webelieve the report would help all relevant concerns and especially policy makers Computer literacy in Bangladesh is steadily on the rise. There is also a growing number of Internet users; cellular phone is widespread and so is accessibility of technology like SMS. While even a few years ago computers were vastly used as digital ‘typewriters’, they are now being employed to maintain accounts worth tens of millions of takas and more importantly...

Words: 299 - Pages: 2

Premium Essay

Intro to It Security

...IMPORTANCE OF INFORMATION TECHNOLOGY SECURITY Importance of IT Security Table of Contents Introduction .................................................................................................................................................. 2 e-commerce Trends ...................................................................................................................................... 2 Risks .............................................................................................................................................................. 4 Cost of Cybercrime........................................................................................................................................ 6 Prevention Steps ........................................................................................................................................... 7 Conclusion ................................................................................................................................................... 10 References .................................................................................................................................................. 11 1 Importance of IT Security Introduction For the business professional information technology (IT) security is of upmost importance. The reliance that companies have on information systems in conducting everyday business transactions has facilitated the need...

Words: 1863 - Pages: 8

Premium Essay

Gaps in Understanding

...Gaps in Understanding EN234 – Computers in Law Enforcement July 6, 2013 Ivy Bridge College/Tiffin University Abstract The goal of this article is provide an explanation of cybercrime offenses, and how they are committed, in order to provide the reader a better understanding of digital crime, such has hacking, identity theft, internet fraud and terrorism and what are the responsibilities of the internet provider in protecting the consumer against these attacks. A look out how children are being affected by cybercrime as well will be explored. In conclusion, possible solutions to cybercrime and agencies in which are responsible for the safety of the public will be reviewed and discussed on how these gaps can be addressed to improve the safety of the consumer (Gercke, 2012). Gaps in Understanding Over the past couple of decades, the internet has been beneficial to students, non-profit organizations, businesses and government. In addition, the increase of cyber-crime has also increased. It is necessary for parents, teachers, industry, and the government progressively thinking about protecting the Internet from the kids who may abuse it. According to the Department of Justice computer crime is categorized in three ways: 1. Cyber criminals target computers by spreading viruses and destroying valuable information needed to keep business in operation. 2. Cyber criminals use the computer as a weapon to commit traditional crimes, such as fraud or illegal gambling...

Words: 1429 - Pages: 6

Free Essay

Cyber Crime

...that corrupt software. The Australian Cyber crime Act which was assented in 2001 and commenced on 2 April 2002 added new offences streamlined to check on those kinds of cyber crime that impair the security, integrity and reliability of computer data and electronic communications. They are; a) Unauthorized access, modification or impairment with intent to commit a serious offence, b) Unauthorized modification of data where the person is reckless as to whether the modification will impair data, c) Unauthorized impairment of electronic communications. There is a maximum penalty for these offences. Investigation powers relating to search and seizure of electronically stored data have been increased (Find Law Australia, 2012). Culprits of cybercrime can ignore the realms of Australian jurisdiction and launch an attack from anywhere in the world or even design attacks that seem to come from foreign sources. Approaches like this make legal and technical involvement of investigating and prosecuting cybercriminals more difficult. A major problem facing cyber crime investigations involves how to determine the jurisdiction where court proceeding shall take place, especially when offences have been committed in different nations or where the suspect’s and victim’s...

Words: 1001 - Pages: 5

Free Essay

Global Crime Analysis Paper

... Fueled by open borders, global markets, and the advancement of telecommunications, international crime has become a rising universal problem. In 1995, President Clinton classified international crime as a danger to the national interest of the United States. Therefore, before and since then the federal government has been busy in a converging effort to address various major global crimes, such as human rights and war crimes, organized crime and narcotics, cybercrime, environmental crime, and terrorism (Global Solutions, n.d.). Human Rights and War Crimes are inhuman acts committed by an extensive or systematic attack aimed against individuals, such as genocide, crimes against humanity, slavery, torture, aggression, and war crimes. Organized crime is a profit-driven criminal organization or group who work together to commit illegal acts to achieve a common goal and most international organized crime involves narcotics violations including drug trafficking, drug manufacturing, and drug distribution are common trends in today's international and national organized...

Words: 1391 - Pages: 6

Premium Essay

Cyber-Crimes Paper

...Abstract Cybercrime is a crime committed on the Internet using the computer as a tool and in some cases a targeted victim. The term “cyber” is a misdemeanor and is not defined (Dashora, 2011). Cybercrime is similar to conventional crime both include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering...

Words: 1393 - Pages: 6

Premium Essay

Cybercrime

...Abstract Cybercrime is a crime committed on the Internet using the computer as a tool and in some cases a targeted victim. The term “cyber” is a misdemeanor and is not defined (Dashora, 2011). Cybercrime is similar to conventional crime both include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering...

Words: 340 - Pages: 2

Premium Essay

U.S. Safe Web Act

...will be covered, for example a little background on its inception and early beginnings. The Federal Trade Commission will also be covered, along with the Act’s basic elements, jurisdiction, inadequacies and finally some major advantages stemming from the Act. Background: With cyber-crime being the growing buzz word in today’s society, we dive into a few key aspects of this particular crime and come to find out, despite the nature of it – there aren’t any weapons involved… nobody is ever robbed at gunpoint, but it is still a very scary experience that might not rob of one’s life (i.e. homicide) but just as bad, it can rob of one’s identity or drain their savings, messing with someone’s livelihood which incidentally can be just as bad. Cybercrime, like scams or spam, or even spyware that is intended to trick/deceive and defraud people might seem like a victimless crime – stemming from the idea that if one loses money, it’s a “fool me once, shame on you. Fool me twice, shame on me” type scenario. If one has their identity, the person affected is not hurt, their credit will be rebuilt....

Words: 1279 - Pages: 6

Free Essay

Cyber Crime- Online Predators

...have chosen to my term paper on Cyber Crime. I chose this topic because I myself have been a victim of this malicious crime in the past. With knowledge I can warn others. Cybercrime can only be described as illegal activity committed on the Internet. I thought it would be good for me to make myself aware of all the research behind this topic so that I will not be a victim again. Cybercrime is a very serious offense and a lot of people do not even realize they have been a victim of it. Cybercrime is no laughing matter. Criminal activities in cyberspace are on the rise. (National Research Council, (NRC), 1991) Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Cybercrimes can basically be divided into three categories: Cybercrimes against persons, cybercrimes against property and cybercrimes against the government. As cases of cybercrimes grow, there is a growing need to prevent them. Cyberspace belongs to everyone. Cybercrime is a menace that has to be tackled effectively not only by the official but also by the users by co-operating with the law. Cybercrime is one of the fastest growing areas of crime. More and more criminals are exploiting the speed,...

Words: 2467 - Pages: 10

Premium Essay

Ocs and Bcs

...statistics of recorded crime seemed adequate as a measure of police workload, but because of unreported and unrecorded crime – deficient as an index of crime. The British Crime Survey illustrates that the public do not necessarily report crimes that they have been victims of, for example in 2008 only 42% of crimes were reported by victims. Victims may not report crimes to the police as they may be too insignificant and believe that the police force either would or could not do anything to help them. As a result, the underreporting of crime lowers the overview amount of measured crime. Statistics are also seen as socially constructed through the invisibility of white collar crime and the use of cybercrime. Official crime statistics often underestimate white collar crime and cybercrime as these crimes commonly go unreported or are proved...

Words: 2106 - Pages: 9

Premium Essay

Cyber Crime

...An Examination of Cybercrime and Cybercrime Research: Self-control and Routine Activity Theory Katherine M. Grzybowski Arizona State University 1 March 2012 Cybercrime 1 TABLE OF CONTENTS 1. ABSTRACT .....................................................................................................3 2. INTRODUCTION...........................................................................................4 3. A REVIEW OF CYBERCRIME ...................................................................6 3.1 Cybercrime Legislation ............................................................................7 3.1.1 Federal Laws .................................................................................7 3.1.2 State Laws ......................................................................................9 3.2 Cybercrime Law Enforcement Agencies ................................................11 3.3 Classifying Cybercrime ............................................................................16 3.4 National Levels of Cybercrime ................................................................19 3.4.1 Business Cyber Victimization ......................................................20 3.4.2 Individual Cyber Victimization ...................................................22 4. A REVIEW OF THEORIES..........................................................................26 4.1 Self-control Theory ....................................

Words: 13816 - Pages: 56