Preview

ITM 6000 Research Study: The Cost Of Cyber-Crime

Powerful Essays
Open Document
Open Document
4620 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ITM 6000 Research Study: The Cost Of Cyber-Crime
ITM 6000 Research Study – The Cost of Cyber-Crime
Submitted by
R. Allen Green
Prepared for
Professor Philip D. Whittle
ITM 6000 Information Technology Management
Fall II, 2013
Webster University
December 16, 2013

CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.
Abstract
Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a
…show more content…

This attack may be undertaken to gather information to support a later attack or the data collected may be the end goal of the attack. This attack usually involves sniffing network traffic, but may include observing other types of data streams, such as radio. In most varieties of this attack, the attacker is passive and simply observes regular communication, however in some variants the attacker may attempt to initiate the establishment of a data stream or influence the nature of the data transmitted. However, in all variants of this attack, and distinguishing this attack from other data collection methods, the attacker is not the intended recipient of the data stream. Unlike some other data leakage attacks, the attacker is observing explicit data channels (e.g. network traffic) and reading the content. This differs from attacks that collect more qualitative information, such as communication volume, not explicitly communicated via a data stream.
b. Data Modification
Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.
In a data modification attack, an unauthorized party on the network intercepts data in transit and changes parts of that data before retransmitting it.
…show more content…

The first is that another person committed the crime. Second, the individual being charged had knowledge of the crime or the principals ' intent. Third, the individual provided some form of assistance to the principal. An accessory in legal terms is typically defined as a person who assists in the commission of a crime committed by another or others. In most cases, a person charged with aiding and abetting or accessory has knowledge of the crime either before or after its occurrence. A person who is aware of a crime before it occurs, and who gives some form of aid to those committing the crime, is known in legal terms as an "accessory before the fact. "He or she may assist through advice, actions, or monetary support. A person who is unaware of the crime before it takes place, but who helps in the aftermath of the crime, is referred to as an "accessory after the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    CARMAX CASE STUDY

    • 406 Words
    • 2 Pages

    CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Bus 505 Assignment 1

    • 1076 Words
    • 5 Pages

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 1076 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    CERTIFICATE OF AUTHORSHIP: I certify that I am the author. I have cited all sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 427 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 435 Wk 11 Final Exam

    • 513 Words
    • 3 Pages

    ____ occurs when an attacker intercepts packets with encrypted data and changes the destination address to forward the packets to a different destination on the Internet.…

    • 513 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Lululemon Case Study

    • 2249 Words
    • 9 Pages

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 2249 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 4052 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 3888 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    SCM 5850 Final Paper

    • 5090 Words
    • 14 Pages

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 5090 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Business Modeling

    • 2408 Words
    • 16 Pages

    CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course.…

    • 2408 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    Despite the fact that there are numerous state and federal reporting agencies, an incredible amount of businesses and regular personal computer users do not report incidents. Among businesses, specifically, ninety percent of cyber crime goes unreported while only two percent of those that are reported end in a conviction. Because businesses have so much of the population 's personal information, and their validity depends on the consumer 's ability to depend on and trust the business, the businesses find a larger risk in revealing that their computer systems are susceptible breaching than the actual loss from a cyber attack. Succinctly, the economic loss from consumer 's mistrust would create a financial loss more damaging than the cyber attack…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    A Man in the Middle (MitM) attack occurs where communication between two network devices is intercepted by an attacker. The attacker can then impersonate both communicating devices, relaying information between the two, such that the communicating network devices will not know that their communication has been compromised. This allows the attacker to read potentially confidential data only intended for the two devices communicating, or even change information as they see fit.…

    • 1605 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Computer Attack Help

    • 836 Words
    • 4 Pages

    Once the attacker has enough information to understand how the business works and what information of value might be available, he or she begins the process of scanning perimeter and internal network devices looking for weaknesses, including…

    • 836 Words
    • 4 Pages
    Good Essays