Cybercrime and its consequences
Discuss about the Cybercrime for Cyber Crime and Digital Intelligence.
The potential ramifications of politically motivated hacking are increasing day by day The reason of cybercriminal activities is that most of the information is stored online that has opened doors for hackers to breach the network security Hackers try to access the data for political or social reason They violate the confidentiality, integrity and security of data by gaining access to the network Thus this report covers the reason why hackers are motivated to perform such activities (Holt, Brewer and Goldsmith, 2018) The reason for hacking differs from one person to other This report throws the light on cybercrime and the consequences of hacking to the network Various issues have been discussed along with the defence policies that are used presently to safeguard the system from all the cybercriminal activities This report also covers the defences used to avoid cyber-criminal activities
Cybercrime can be defined as a crime in terms of hacking, phishing or spamming Various tools are used to commit offences Hackers try to access the personal information by performing malicious activities They try to communicate to each other with the purpose to leak the valuable data by performing illegal activities Criminals use various theories to relate it to cybercrime by targeting to criminal attacks like denial of services, cyber stalking, modification of information as well as many attacks They work on a theory to inject viruses in the system or network to spread the malware and sensitive data on the network It is an activity that is intentionally performed by criminals to harm an individual or group of individuals Cybercrime may cause a huge loss to business as it effect the economy of an organisation Hackers try to breakdown the statistics and the main reason behind their hacking purpose is ransom, threats, political reasons, competition in the market, cyber war and some other motivation Ransom is the main reason that affects the network and its security They try to attack new users using new hacking strategies that motive behind this could be financial, political and ideological Hackers design plans to stay longer and access the information transparently
Hackers try to gain sensitive data by breaching the network and then motivated by financial gain The motivation behind hacking is accessing the companies’ data so that their strategies could be leaked They try to access the information to gain financial benefits or to remove glitches or grudges with other businesses FIG that is fun, ideology and grudges is the main factor that has motivated hackers Some of the hackers do not have any wrong intention they just do to add security rules The first reason behind hacking is their hobby or interest to destroy the security of the system (van and Leukfeldt, 2017) They try to hack the site by bringing down its performance and spoiling its image Hacking is a political issue that aims to undermine the enemy Hackers are a most significant threat that exists on a network
Motivation behind hacking
The consequences of hacking have affected the public perception as the data stored on internet is not secured which will spoil the good will of an organisation The increase in hacking activities will lead to criminal issues (Hui, Kim and Wang, 2017) Hacking has a negative effect on the environment as it will lead to loss of sale and add up additional cost There are chances of data loss and might also leads to data distortion The effects of hacking on an organisation affect it by much purpose like insubordinate, corporate espionage as well as thefts The other consequences of cybercrime is interconnected cost of an organisation, if the data is leaked then the organisation would suffer from loss of revenue (Broadhurst, et al, 2014) Hacking resolves around gaining information such as financial reports, business strategies as well as sensitive operation They get to know the completive edge of an organisation that can cause political issue in the business Risk of hacking affect the digital network of business as it allows invalid users to access the data Hacking impact the organisation in many ways as it breaches the security by leaking the sensitive data and risking the privacy of data They impact the privacy of data which expose the user personal details, credit card number, account details and software’s The impact of cybercrime affects the trust issues on the network It is important to identify the thefts so that hackers do not cause any damage to the credential data It is important to take care of such details so that security and confidentiality of information is maintained (Kranenbarg, et al, 2017) Hackers sometimes take the ability to access the email which leaks the private files and simply ruins the confidentiality Hackers are the victims who spoil the website security of business They simply leave the website in inoperable manner by destroying the data They copy the signatures that pose up the risk for organisation by leaving the bugs which is not common
It can be taken as a political statement as hacker’s steal the data which is against government laws and is treated as an illegal activity It is difficult to track the hackers thus they future penetrate in the system and destroy the system The consequences of hacking arise to the remote access of information They impact of cyber-crime increase cyber stalking that is termed as online harassment Some of the software’s are used to disrupt the scenario of network They just gain access to steal the information by damaging the present system The main cause of cybercrime is people who try to access the data over the system
Consequences of hacking on the network and the organization
The potential consequences of motivated hacking is due to economic gain as third party try to access the information by blackmailing and directly penetrating in the system without any permission They break the system or network because of social or political reason For gaining poetical knowledge hackers generally access the government bodies to know their spectrum of working (Marsh, 2017) They act as a stereotype in the virtual world as they try to gain all the sensitive information in the system The motivation of hacking could be either good or bad The hackers could be either white hat hackers or black hat hackers White hat hackers do not have any wrong motivation they are the experts that make sure that security do not penetrate in the system They are the It experts that make sure that technology and information is secured (Marcum, et al, 2014) The black hat hackers intentionally create viruses to break the network They have the motivation to break the system so that they could access the sensitive data The other motivation of cybercrime is espionage They do not try to gain the financial gain instead of that they desire to read the sensitive information (Johnson, 2016) Spamming is the other way they use to create inconvenience by adding unwanted content on the network
The main reason behind their hacking motivation is their curiosity to know the personal information about others life They try to gain access by using digital platform and target the audience They commit these attacks by perform bragging activities to access all the personal data including account details or sort codes Retaliation is the other reason that allows unwanted data to secure the devices (McMahon, et al, 2015) Thus it is important for maintain security at cyberspace as most of the data of all the organisations are stored over a network Thus it is necessary to secure all the data so that goodwill is maintained in the market The data is secured by using proper encryption technique as they make sure that even if data is leaked to some third part user they wouldn’t be able to access the data without the access of secret keys Other measures are also taken like providing access rights and many other techniques (Paul and Aithal, 2018) The policy issue covers that the right to access the information should be given in appropriate manners so that no invalid users get the right to access the information
Different types of hackers
The defence against cybercrime requires innovative idea as such activities are increasing day by day Cyber-attack impacts the organisation and also affects the economy of the company Many defence tools are used to protect the system The current defence tools include authorization, lack of knowledge, coercion, access control and many more The person should be proper authorized to access the system, no unauthorised user should be given right to access or modify the data If the information is access by some invalid user there are chances that information would be leaked The other issue due to which cybercrime rises is lack of knowledge (Rathore, 2015) Cybercrime can be generally fall into two categories first covers all the traditional offences that are designed to record all the activities so that in case of criminal activity proper measures could be undertaken Other than that there are few steps that are taken to secure the system that is done by installing antiviruses and keeping the system updated Firewalls help in securing the system as they safeguard the network from all the vulnerable attacks Installing such firewalls provide a security to a network (Han, et al, 2016) The operating system should also be kept updated so that all the activities are controlled by the administrate that includes securing the private and sensitive information The operating system should be of latest version so that there are no chances of attacks as these tools provide automatic protection The current defence includes in the motivation of finding the loopholes in the system so that measures could be taken Once the loopholes are identifies some techniques are used like installing intrusion detection, keeping information backup, and much more Intrusion detection is a tool that keeps track of the entire network in the system and they give an alert or notification as soon as some breached is found The signs of intrusion help in knowing the loopholes and future protection measures are taken Additionally, information should be backed up regularly so that in case of loss of data files or resources it does not cause any problem to the working of a business (Brown, 2015)
The access rights need to be designed properly so that there are no chances of data leakage The current defence covers rules to provide access to information to valid user so there are no chances of vulnerabilities Access is highly restricted so that they do no harm the business The organisations currently hire a security expert to deal with all the potential risk and prevent them to penetrate in the system so that they do not cause any damage There are few other precaution methods that are available like using an antivirus program to block all the unwanted links (Holt and Bossler, 2014) This will assure that no vulnerabilities will exist in the system The pop-ups that occur on the screen also needed to be avoided as they carry viruses in them The defence strategies states that card details should not be shared on the website nor should the confidential data are stored on the website to assure that data is not disclosed The antivirus is used as it guarantees that the system would be protected from all the attack The admin also watch the traffic to know that the irregularities of the site are avoided The politically outcomes could likewise settled as it incorporate multi-layer safeguard assurance to every one of the gadgets A portion of the security suite is Norton Security Premium to guarantee that system is shielded from all the infections and dangers because of web
Current defence policies against cybercrime
Additionally there are various security suites that are available to protect the devices from all the malware (Fell, 2017) The politically consequences could also resolved as it include multi-layer defence protection to all the devices Some of the security suite is Norton Security Premium to ensure that network is protected from all the viruses and threats due to internet The current defence include that strong passwords need to be maintained so that system remain locked and access through only valid users The social media is a platform that provides a way to hackers to enter the system thus they need to be managed properly to avoid all the cyber-criminal activities (Taylor, Fritsch and Liederbach, 2014) The home network should also be secured by keeping all the data encrypted along with VPN
Conclusion
From this report it can be concluded that cybercrimes are increasing day by day This report throws limelight on cybercrime and how it has affected various organisations and they affect market by such activities They relate cybercrime by criminal activities the main motive behind hacking is violating the security, confidentiality and integrity of data Cyber-criminal activity affects the growth and profit margins of an organisation They attack new users on the system with the motivation to gain financial benefits and attack the ideology used by business for their growth This report covers the short introduction of cybercrime and how they have affected the security The main motivation behind hacking has been allayed I the second section The motivation behind their hacking is leaking the companies data and misusing it for financial benefits or fulfil personal grudges This report states that all the hackers do not have a false intention some perform hacking activities just to look for the bugs and to check if some hackers are silently accessing the data The potential consequences of hacking have negative effect on the network and leads to data distortion They affect the working by of company as it causes breaching of computer data and causing risk of privacy of data It is important to resolve such issue by making sure access rights should be given to only valid user This report also covers the defence that are undertaken to stop the cybercrime and stop such activities to penetrate the system Thus it is important to follow steps to assure that the information remains secured
References
Ablon, L and Libicki, M (2015) Hacker’s Bazaar: The Markets for Cybercrime Tools and Stolen Data Def Counsel J , 82, p 143
Arief, B Adzmi, M A B and Gross, T (2015) Understanding cybercrime from its stakeholders’ perspectives: Part 1–attackers IEEE Security & Privacy, 13(1), pp 71-76
Bhargava, N and Kumawat, A (2015) Scenario of Cyber Crime in india-Threat to Persons, Property and Government International Journal of Advanced Research in Computer Science, 6(4)
Bossler, A M (2016) Cybercrime 3 research at the crossroads Cybercrime Through an Interdisciplinary Lens, 26, p 37
Broadhurst, R , Grabosky, P , Alazab, M , Bouhours, B and Chon, S (2014) An analysis of the nature of groups engaged in cyber crime, pp- 45-90
Brown, C S (2015) Investigating and prosecuting cyber crime: Forensic dependencies and barriers to justice International Journal of Cyber Criminology, 9(1), p 55
Fell, J (2017) Cyber crime-History: Hacking through history Engineering & Technology, 12(3), pp 30-31
Han, M L , Han, H C , Kang, A R , Kwak, B I , Mohaisen, A and Kim, H K (2016) WHAP: Web-Hacking Profiling Using Case-Based Reasoning In Communications and Network Security (CNS), 2016 IEEE Conference on (pp 344-345) IEEE
Holt, T J and Bossler, A M (2014) An assessment of the current state of cybercrime scholarship Deviant Behavior, 35(1), pp 20-40
Holt, T J , Brewer, R and Goldsmith, A (2018) Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime Deviant Behavior, pp 1-13
Hui, K L , Kim, S H and Wang, Q H (2017) Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks Mis Quarterly, 41(2), p 497
Johnson, M (2016) Cyber Crime, Security and Digital Intelligence Routledge
Kranenbarg, M W , Holt, T J and van Gelder, J L (2017) Offending and Victimization in the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only, Victimization-Only and the Victimization-Offending Overlap Deviant Behavior, pp 1-16
Marcum, C D , Higgins, G E , Ricketts, M L and Wolfe, S E (2014) Hacking in high school: cybercrime perpetration by juveniles Deviant behavior, 35(7), pp 581-591
Marsh, D (2017) Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee State University)
McMahon, R , Serrato, D , Bressler, L and Bressler, M (2015) Fighting cybercrime calls for developing effective strategy Journal of Technology Research, 6, p 1
Paul, P and Aithal, P S (2018) Cyber Crime: Challenges, Issues, Recommendation and Suggestion in Indian Context
Rathore, N (2015) Ethical Hacking and Security Against Cyber Crime i-Manager’s Journal on Information Technology, 5(1), p 7
Taylor, R W , Fritsch, E J and Liederbach, J (2014) Digital crime and digital terrorism Prentice Hall Press, pp-90-110
van de Weijer, S G and Leukfeldt, E R (2017) Big five personality traits of cybercrime victims Cyberpsychology, Behavior, and Social Networking, 20(7), pp 407-412