Introduction to Cybercrime
Background information:
Cybercrime or computer oriented crime can be explained as the crime which mainly involves the computer or a network and in this type of crime a computer can be used or can be targeted by ab attacker. This are the offences which are mainly committed against a group or an individual and the main motive of this crime is to harm eth reputation of the attacked victim or to harm them physically and mentally. The effects of cybercrime might include loss of property, important information and many more. Modern telecommunication networks which might include the internet and mobile phones is mainly used for this purpose. The threats due to cybercrime is multi-dimensional and this mainly targets the citizens, business and the governments. This the rate of cybercrime is increasing rapidly and are responsible for imposing a direct threat for the security and privacy issues for different sections of the society.
This thesis is mainly associated with providing an overview about the cybercrime. Besides this the thesis also discusses about the major problems occurring due to the cybercrime. Along the topics which has been discussed below, there also exists other types of threats which are responsible for various type of devastating effects. The thesis also provides some suitable solution in order to mitigate the main risks.
Loss of data and threats to the personal and financial information
Data plays a significant role in the sophisticated and the self-sufficient digital economy that different section of the society is having. Loss of any kind of financial or personal information can lead to devastating effects. The personal information might include the identity and identity theft might lead to accessing of different information like the accessing of the bank accounts or any other type of important user accounts. Cybercrime is associated with driving a number of criminal activities and this might include the phishing, pharming, malware distribution and many more. All this attacks are supported by the infrastructure which are fully fledged by the malicious code writers, or web hosting specialists or individuals who are capable of leasing a network of several compromised computers in order carry out attacks which are totally automated.
Loss of data and threats to the personal and financial information
This type of problems can be eliminated by actively targeting the underground fora and this is to be done for the purpose of disrupt the circulation of the powerful as well as the easy to use cybercrime tools which might include the malware kits and the botnets and many more. Another way includes the disruption of the infrastructure of the malicious code writers or web hosting specialists. This is to be done by active identification of the groups associated with developing and also the information and communication technology industry this is to be done in order for the purpose of dismantling. There should also exists an active targeting of the various proceeds related to cybercrime with collaboration to the financial sector. Besides this the development of the insights related to the behaviour of the contemporary cybercriminals by means of various processes is to be continued. The processes might include the intelligence analysis, criminological research and profiling techniques which are mainly based upon the combined law enforcements. This are to be done for the purpose of deploying the resources in a much efficient way.
Types of Cybercrime and Their Effects
Problems related to the Communication technologies
The communication technologies have been capable of making a lot of advancements in the last few decades. Besides this the convergence of the “Information” with the society has taken place like never before in the entire history of human kind. For this reason the rise of the industrialization of a type of crime in which the personal information, commodity, has moved very far at a quick rate and due to this reason it has become very much difficult for the conventional law enforcement methods to keep a pace with this. Along with this, the unprecedented scale of the problems has been associated with threatening the ability of various authorities while responding against the different type of viruses and other type of malicious codes which are in global circulation. It is almost impossible to state the number of computers which are being effected by different type of cyber-attacks per day.
Problems related to the Communication technologies
The authorities are having a lot of data on various criminal activities present at their disposal and now they have the opportunity to harness all this information in such a way which would be helping in the intelligence development and investigation become more streamlined as well as cost effective. Besides this there is an essential need of doing things which would be helping in harnessing of the intelligence of the network and the information security stakeholders. This should be done not only to provides an accurate and comprehensive process for accessing the cybercrimes but also to makes sure that the response to the cybercrimes are done in a timely and effective way. Besides this there is also a need of establishing an active partnership with the ISPs, organizations associated with Internet Security and the online based financial services. Another way includes a collaboration particularly with the private sectors in order to identify the feature which are associated with the future communication technologies is to be done proactively. This future communication technologies which would be identified might be liable to exploitations. The designing of the technologies is to be done in such a way that elimination of the vulnerabilities is done.
Cybercrime has become a Global criminal phenomenon
Cybercrime is a global criminal phenomenon which is associated with blurring the traditional distinction which mainly exist between the internal and the external security. Besides this it is also not associated with responding to a singular jurisdiction approach towards the policing. The networks are having a number of different end s and besides this it is very much easy for the users to move from one type of illegal activity to another is associated with suggesting the fact that territorialism is associated with hindering every efforts which are mainly regarding successful combating of the misuse of different communication technology. Another major threat related posed upon the society due to cybercrime is the promotion and easy availability of the pornography which mainly includes child pornography for example pictures or films. Along with this there also might exist some situations where different type of writings depict the sexually explicit activities which is mainly related to a child. The child’s are abused during the sexual acts and this acts are recorded and produced in the cyber world by means of child pornography.
Mitigation Techniques for Cybercrime
Increased rate of cybercrime on a global basis
Supporting ideas:
The national authorities are associated with overcoming the jurisdictional restrictions and this mainly done by means or coordination with the several agencies which are having the similar range of capabilities in understanding and responding to the crimes which are facilitated by the internet. There should exist a centralized coordination between the regional and the interregional regions os as to fight against the cybercrimes. There is also a need of implementing a Global Cyber Law. Taskforces ca also be established for the purpose of targeting the cybercrimes facilitated by the internet. The taskforce must be very much responsive to the criminal environment which is evolving day by day. Besides this all cases, the authorities also needs to be flexible so as to include the different stakeholders and this is to be done for the purpose of achieving an outcome which has been desired. One such cyber task force might be the World Cyber Cop. The World Council for Law Firms and Justice is associated with promoting the evaluation and harmonization of the legal systems all over the world. Besides the establishment of the International Cyber Criminal Court is responsible for taking actions against any type of crime conducted over the internet.
References
Ibikunle, F., & Eweniyi, O. (2013). Approach to cyber security issues in Nigeria: challenges and solution. International Journal of Cognitive Research in Science, Engineering and Education:(IJCRSEE), 1(1), 100-110.
Lagazio, M., Sherif, N., & Cushman, M. (2014). A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security, 45, 58-74.
Sullins, L. L. (2017). “Phishing” for a solution: domestic and international approaches to decreasing online identity theft. In Computer Crime (pp. 73-110). Routledge.
Jewkes, Y., & Yar, M. (Eds.). (2013). Handbook of Internet crime. Routledge.
Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2014). Digital crime and digital terrorism. Prentice Hall Press.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97-102.
Blaži?, B. J., & Klobu?ar, T. (2016, August). Missing Solutions in the Fight against Cybercrime and Cyberterrorism—The New EU Research Agenda. In Intelligence and Security Informatics Conference (EISIC), 2016 European (pp. 128-131). IEEE.
Conteh, N. Y., & Staton, Q. (2016). The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions. International Journal of Computer Science and Business Informatics, 15(6).
Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013, March). Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications. In Autonomous Decentralized Systems (ISADS), 2013 IEEE Eleventh International Symposium on (pp. 1-6). IEEE.
Ajayi, E. F. G. (2016). The impact of cybercrimes on global trade and commerce. Available at SSRN.
Konradt, C., Schilling, A., & Werners, B. (2016). Phishing: An economic analysis of cybercrime perpetrators. Computers & Security, 58, 39-46.
Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: overview and Issues. Crime, Law and Social Change, 67(1), 3-20.
Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for cybercrime tools and stolen data: Hackers’ bazaar. Rand Corporation.
Moore, R. (2014). Cybercrime: Investigating high-technology computer crime. Routledge.
Yar, M. (2013). Cybercrime and society. Sage.
Al Amro, S. (2016). Cybercrime and its Impact on E-government Services and the Private Sector in The Middle East. International Journal of Computer Science and Information Security, 14(3), 69.
David, B. (2012). Mechanisms of corporate governance and corporate law. Economics, Management and Financial Markets, 7(4), 270.
Duah, F. R. A. N. C. I. S. C. A. (2013). The Growing Global Threat of Cybercrime: Implications for International Relations(Doctoral dissertation, University of Ghana).
Valiaveedu, R. V. (2016). Achieving Cyber Resilience, Reducing Cybercrime and Increasing Cyber Defense Capabilities: Where Should the US Department of Defense Concentrate Today to Prevent Cyberattacks of Significant Consequence. AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY MAXWELL AFB United States.