Preview

Cyber Crime in America

Powerful Essays
Open Document
Open Document
2352 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime in America
Abstract
Cyber-crime is becoming a massive problem for citizens and businesses. Every day there is a hacker that gets into a computer system and causes trouble. It’s all due to businesses and individuals being careless with their computer security. People need to start realizing this is a serious issue and can affect anybody. There are numerous steps that need to be taken in order to protect individuals and businesses security. Hackers are getting smarter and want to find new ways to infiltrate your computer system. They want to find ways to get to your files and your credit card information. Hackers find new ways to get into our computers every day and know the ins and outs of computers. These hackers have the ability to shut down a national company that specializes in computer security. There are so many terrible things that these hackers can do to your computer. We need to take the proper steps to protect ourselves and to ensure that the hackers do not harm us or our computers.

Introduction
Cyber-crime is one of the newer forms of crime that have risen over the past few decades. While this form of crime cannot physically hurt anyone, it will certainly hurt their pocket, their dignity and their computer. Being a new form of crime, there are not very many ways to prevent it or how to locate the criminals. Many people have been harmed in many different ways by this crime. These people have lost personal items, documents, and potentially credit card information. The way we can solve cyber-crime is by limiting our personal information about ourselves on the internet, joining random Wi-Fi networks, and avoiding random or spam accounts on social media websites. Cyber-crime is dangerous for both individuals and large businesses and both need to take the proper precautions to prevent being in danger.
Definition
One of the first questions that must be answered is what exactly a cyber-crime is and how do people commit the crime. Since cyber-crime is such a



References: Bradley, T. (2010) How to stop 11 hidden security threats. PC World, 28(3), 68-75. Retrieved from Academic Search Complete database. Dysart, J. (2011). The hacktivists. ABA Journal, 97(12), 40-46. Retrieved from Academic Search Complete database. Piore, A. (2012) The secret war. Popular Mechanics, 189(1), 52-57. Retrieved from Academic Search Complete database. Singer, P. (2012, May). The “ocean’s 11” of cyber strikes. Retrieved from http://www.brookings.edu/research/articles/2012/05/21-cyber-threat-singer Tafoya, W. (2011). Cyber Terror. FBI law enforcement bulletin, 80(11), 1-7. Retrieved from Academic Search Complete database. Wilhelm, R. (2012) Cyber warfare…The new reality. Vital Speeches of the Day, 78(5), 145-149. Retrieved from Academic Search Complete database.

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…

    • 3358 Words
    • 14 Pages
    Powerful Essays
  • Best Essays

    6. Tankard, C. (2011, August). Advanced persistent threats and how to monitor and deter them. Network Security, 2011(8), 1619. doi:10.1016/S1353-4858(11)70086-…

    • 1960 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Hale, Chris. (2002). Cybercrime: Facts & Figures Concerning the Global Dilemma. Crime and Criminal Justice, vol. 18, no.65, pp.5-6, 24-26.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Over the past couple of decades America has been fighting against the growing threat of terrorism. As the new millennium unravels, the age of the computer dawns the terrorists are beginning to fight on a different mainframe: the computer. The latest threat to U.S. intelligence is not terrorist attacks anymore, but cyber terrorism. As your Special Advisor on cyber security and cyber terrorism, I can prevent terrorist from all over the world from causing damage to our country.…

    • 613 Words
    • 3 Pages
    Best Essays
  • Best Essays

    McClure, S., Scambray, J., & Kurtz, G. (2009). Hacking exposed 6: Network security secrets & solutions. New York: McGraw-Hill.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    “American consumers and businesses are the number one target of global cyber crime. For example, the Computer Security Institute and the FBI report that virus attacks have become a leading cause of financial loss by US companies, with businesses reporting an average of more than $160,000 for each security breach. According to the Internet Crime Complaint Center, the total dollar loss from all cases of Internet fraud referred to US law enforcement in 2007 was $239 million. The rapidly evolving world of global cyber crime--and what must be done about it--is described and illustrated with charts and anecdotes in the BSA report, The Fight for Cyber Space. Another recent BSA report, Online Software Scams: A Threat to Your Security describes the links between software piracy and cyber crimes such as identity theft.”(October is National Cyber Security Month, 2008)…

    • 635 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Stevens, T., & Jusko, J. (2001). Cyber-terrorists under attack. Industry Week/IW, 250(2), 11. Retrieved from EBSCOhost.…

    • 2860 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    In today’s society, technology plays an important role in our everyday lives. Technology has made many lives easier, but with this ease, comes with many risks. People are becoming savvier about how to break into computer systems and access personal information. For many people, this is considered a breach of security. According to wisegeek.com, a security breach is “an incursion into a computer or network of computers, usually by hackers or malicious software that compromises sensitive data or causes damage to computers or network function.”1 Most of the time these so-called “computer hackers” find ways to evade security systems to steal important personal information such as social security numbers, home addresses and banking information. These hackers can be either a young person experimenting with information technology or an advanced computer programmer. Some will take this information and engage in illegal behavior such as leasing a car or opening a credit card or applying for a home loan. Many times this violation of security can lead to devastating consequences for the victim. On occasion, a computer security breach can be caused by only one person or a group of people. Other times, it can be caused by “malicious software, viruses, or other programs [which] are inserted into a system with the aim of destroying data or damaging the ability of a computer or network to operate.” 1 There are several types of security breach, all of which can be detrimental. “In a network-based breach, a malicious user gains access to a computer through any open network connections the computer may be using, such as a LAN connection or a wireless network connection.” 2 Another form of security breach is called malware. It is a type of “malicious software that can compromise a computer 's security…a user may unknowingly install malware by downloading a file off of the Internet or by visiting a website that automatically downloads software via the Internet…

    • 814 Words
    • 4 Pages
    Powerful Essays