Tony Tyboroski
10/18/2013
CJA/464
Professor Kim Chapman
The Cyberspace/Technology revolution has provided a vast improvement on the general welfare. Three areas that have improved within Federal cybersecurity include: Continuous monitoring of Federal information systems, Trusted Internet Connection (TIC) capability and use, and Strong authentication using government issued identity credentials, such as PIV (Personnel Identity Verification) and CAC (Common Access Cards). ("Improving Cyber Security” ). Communities worldwide connect, socialize, and organize themselves around cyberspace. International businesses for the trade of goods and services in cyberspace, move assets across the globe in a matter of seconds. Cyberspace has advanced the freedom of speech and the social networking that drives our economy. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. Department of Defense, Homeland Security, depends greatly on the cyber information. It enables them to operate smoothly and quickly at a bigger spectrum. DOD operates over 15,000 networks and seven million computing devices globaly. DOD is made to protect the freedom, privacy, and the free flow of information that we put on the cyberwaves. ("Department Of Defense Strategy For Operating In Cyberspace", 2010). During the last decade this technology revolution has victimized the U.S. and its citizens by cybercrime. Identity theft is a growing epidemic and has made society undermine the confidence in the information systems that underlie our economic and national security interests. “Cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation” (2010 National Security Strategy). Cyber attacks are to be the third greatest threat to are nation("Department Of Defense Strategy For Operating In Cyberspace", 2010). Cybercrime is one of the greatest threats to our country and nation wide, and has had serious implications for our national security, economic prosperity, and public safety. One case that was nationally known was the Coreflood Botnet Takedown & Civil Action case in Connecticut which was the first of its kind. Millions of computers were infected by what is called “Corflood Botnets”. Perpetrators used internet providers to issue commands to, and receive stolen data from the infected computers. The stolen data consisted primarily of Internet browsing traffic of unsuspecting users, including online banking credentials. The hackers used the stolen credentials to wire hundreds of thousands of dollars from victims, most of which were small-to medium-sized businesses and similar entities. The policy that was implemented was formed by the FBI that the stealing of additional data and blocking Coreflood from updating itself. The FBI worked with Internet service providers to identify and notify the owners of the infected software. The FBI also worked with Microsoft and other software vendors, in order to make available updated anti-virus tools for removing Coreflood. ("U.s. Department Of Justice: United States Attorneys On Cybercrime", ). Stastitics show that by 2017, the Cyber market is expected to skyrocket to $120.1 billion. The estimated annual cost over global cyber crime is 100 billion. Since Facebook was developed more than 600,000 have been victims of fraud. One out ten social networkers fall victim to Cyber Crime by spam email and others. ("Cyber Crime Statistics And Trends ", 2013). There are a few common types of Cyber attacks that victims fall pray to. One that is most common is the viruses that Trojans bring into your hardware. Fifty percent fall pray to this crime everyday. Another one is Theft of Data devices. Twenty eight percent of americans fall pray to this crime and there personal information is stolen such as their social security, date of birth, as well as account numbers to their banks.
Statistics Of Bank Fund Fraud Cases Loss And Recovery
22% were able to hold on to funds
10% were able to recover fraudulently transferred funds
68% were declared unrecoverable
37% caused loss to banks due to reimbursements
60% caused loss to businesses
("Cyber Crime Statistics And Trends ", 2013). There are over 556 million people per year that fall victims to cyber crime and eighteen per second. This tells me the cyber world is taken over the future of internet crimes. ("Cyber Crime Statistics And Trends ", 2013).
Please click on the video link: http://youtu.be/dSYLPihGPZE
I will be implementing a policy that will combine different agencies across the world to deter the War on Cyber crime. My policy will include law enforcement agencies in the U.S.. The FBI, theUnited Kingdom, New Zealand Police, the Australian Police, and the Royal Canadian Mounted Police. Each of these agencies will share intelligence, tools and practices, and strengths. I will make a proposal for a Information security research and analysis agency for advanced attackers of cybercrime. This proposal will be called "Tyboware". This team will create interest in detecting computer viral hackers and trojan breaches. They will gather intelligence, respond to information security alerts, and break the "kill chain" or cyber-attack process. Tyboware can help at every step including the following:
Global threat intelligence from our Counter Threat Unit (CTU) about emerging cyber threats against your organization.
Threat hunting services to mine deep within the environment for threat indicators .
Active incident responders contain the advanced threat and break the kill chain.
Support special initiatives directed at fraud involving large-scale victimization. Each local, state, and federal agencies will be provided with this program to help fight cybercrimes. Also it will form an infrastructure with with the private industry and the public to expand the information flow to better educate, train, and other solutions to respond, prevent, and protect against terrrorist attacks and natural disasters. It will also enhance the risk management capabilities which is a key to national security. With the help of the FBI, banks will be able to identify fraudulent accounts from other countries. Keeping within the legal boudries, we can have a greater flow of information which willl result in the improved protection of the infrastructure of the U.S.. reinforcing existing structures of the system will help promote domestic laws that could help the government contribute effectively and efficiently to the development and enforcement of global, international rule of law and ensure full compliance.
References:
Department of Defense Strategy for operating in cyberspace. (2010). Retrieved from http://www.defense.gov/news/d20110714cyber.pdf
Improving Cyber Security. (). Retrieved from http://technology.performance.gov/initiative/ensure-cybersecurity/home
U.S. Department of Justice: United States Attorneys on Cybercrime. (). Retrieved from http://www.justice.gov/usao/briefing_room/cc/
Cyber Crime Statistics and Trends . (2013). Retrieved from http://www.go-gulf.com/blog/cyber-crime/ http://youtu.be/dSYLPihGPZE 6 Great Facts About Cybercrime. (2011). Retrieved from http://www.computerescape.com/blog-0/bid/241590/6-Great-Facts-About-Cybercrime
References: Department of Defense Strategy for operating in cyberspace. (2010). Retrieved from http://www.defense.gov/news/d20110714cyber.pdf Improving Cyber Security. (). Retrieved from http://technology.performance.gov/initiative/ensure-cybersecurity/home U.S. Department of Justice: United States Attorneys on Cybercrime. (). Retrieved from http://www.justice.gov/usao/briefing_room/cc/ Cyber Crime Statistics and Trends . (2013). Retrieved from http://www.go-gulf.com/blog/cyber-crime/ http://youtu.be/dSYLPihGPZE 6 Great Facts About Cybercrime. (2011). Retrieved from http://www.computerescape.com/blog-0/bid/241590/6-Great-Facts-About-Cybercrime
You May Also Find These Documents Helpful
-
In today’s computing world, threats come in many different forms. Business and organizations are bombarded with electronic threats every second. Denial of service (DOS), network disruptions, and stealing of confidential information not only hurt businesses, but also hurt customers. With identity theft so prevalent, a business owes its customers the highest level of security possible. Many mechanisms are available protect critical infrastructure and information.…
- 890 Words
- 4 Pages
Better Essays -
This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…
- 2263 Words
- 11 Pages
Best Essays -
A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…
- 1317 Words
- 6 Pages
Better Essays -
The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…
- 1100 Words
- 3 Pages
Better Essays -
known as the 'Public Company Accounting Reform and Investor Protection Act ,Corporate and Auditing Accountability and Responsibility Act and commonly called Sarbanes–Oxley, Sarbox or SOX, is a United States federal law which set new or enhanced standards for all U.S. public company boards, management and public accounting firms. It is named after sponsors U.S. Senator Paul Sarbanes and U.S. Representative Michael G. Oxley.…
- 2191 Words
- 9 Pages
Powerful Essays -
Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…
- 1278 Words
- 5 Pages
Better Essays -
Some disorders cause the thyroid to make more thyroid hormones than the body needs. This is called hyperthyroidism, or overactive thyroid. The most common cause of hyperthyroidism is Graves’ disease. Graves’ disease is an autoimmune disorder, in which the body 's own defense system, called the immune system, stimulates the thyroid. This causes it to make too much of the thyroid hormones. Hyperthyroidism can also be caused by thyroid nodules that prompt excess thyroid hormones to be made. A thyroid nodule is a swelling in one section of the thyroid gland. The nodule can be solid or filled with fluid or blood. You can have just one thyroid nodule or many. Most thyroid nodules do not cause symptoms. But some thyroid nodules make too much of the thyroid hormones, causing hyperthyroidism. Sometimes, nodules get to be big enough to cause problems with swallowing or breathing. In fewer than 10 percent of cases, thyroid nodules are cancerous. Thyroid nodules are quite common. By the time you reach the age of 50, you have a 50 percent chance of having a thyroid nodule larger than a half inch wide.…
- 1646 Words
- 6 Pages
Good Essays -
Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…
- 1586 Words
- 7 Pages
Powerful Essays -
Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…
- 1725 Words
- 5 Pages
Better Essays -
My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…
- 380 Words
- 2 Pages
Good Essays -
As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…
- 1585 Words
- 7 Pages
Powerful Essays -
Since the beginning of the internet new opportunities for criminal activities have increased significantly. Most of America’s government agencies, businesses, citizens, online businesses activities have been subjects of numerous attacks. America is dependent upon its computer networks to ensure operations of its infrastructure and national security. Many problems can be attributed to international crimes like the attack on the financial networks on September 11, 2008. This caused the fall of the stock market from anonymous people using naked shorts that are considered illegal today which was used to destroy our financial…
- 3358 Words
- 14 Pages
Powerful Essays -
In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…
- 930 Words
- 4 Pages
Better Essays -
Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…
- 824 Words
- 4 Pages
Good Essays -
This annex is planned to give significant policies, activities and obligations that are required to react to cyber-related occasions that have national ramifications. The annex puts forward the organized responses from government, state, local, tribal and private-division accomplices. This annex examines policies, association, activities, and obligations regarding a planned, multidisciplinary, expansive supported method to get ready for, react to, and recuperate from cyber-related Incidents of National Significance affecting basic national procedures and the national financial system.…
- 1327 Words
- 6 Pages
Good Essays