Wednesday, December 4, 2019

Cyber Crime for People and Organization

Question: Write a problem solution essay on "cyber crime for people and organization"using the structure, elements and essay plan. Answer: Introduction Cyber crime is regarded as the crimes that comprises network or computer to exploit others network. It is growing at a fast pace that is affecting the system of many big organizations and individuals. The criminal organizations are doing activities with criminally minded technology experts to commend the cyber crime. Therefore, important or confidential data are being lost that are hampering the society and the organizations to do work in effective way. Thus, the current assignment will be discussing the three major problem associated with the cyber crime and solution to it will be provided further. Problem 1: Hacking According to Alliance (2015), this type of crime is conducted by criminals in order to trespass into the personal and sensitive data of the person so that it can be used for their benefit or spreading the information publicly. The hackers can be doing such illegal activity for the sake of protest, income or satisfying their personal need. Therefore, hacking can lead to loss of information and on the other hand, website security of the business or person can be breached. For instance, a hacker has stolen the identities of players, weapons, virtual money and skills from an online computer game RuneScape (K. Sindhu, 2012). Therefore, it can be understood that hackers can enter to anyone system and steal the information for their specific purpose. Apart from that, hackers can release malicious worms into the system of users that can damage the total system and user may not be able to do anything. For example, the hacker can hack the bank account details, credit cards, personal emails, fi nancial information, etc (Kumar and Mittal, 2012). Solution Shukla et al. (2012) proposed that users of pc system can remain same from hacking or hackers by installing effective antivirus software such as Quick Heal, Avast Grime Fighter, etc. On the other hand, the user can set tough password so that it can be difficult for the hacker to crack it. Apart from that, the user should not click on any links that are unexpected or offering any monetary benefit. Further, Silver (2013) discussed that the user should block the invitation that is sent by unknown person on social media such as Facebook, Linkedln, etc. This would help in safeguarding the system and personal information. The Data Security Standard can be useful for the industry to protect the credit cards details and financial information of the customers. The dotDefender can be effective in addressing the issues faced in the website in cost effective way (Crossdomainsolutions.com, 2015). Problem 2: Theft As per Orlov (2012), this type of crime can take place when a person breaches the copyrights of someone else. For example, the criminals can access the computer system and steal the software, movies, music and games via internet. On the other hand, it has been seen that many people uses internet for the purpose of transacting cash and for banking services. Therefore, cyber criminals can attack the bank account of the person and do trading with the name of victim. Moreover, credit history of the victim can be erased that can lead to financial losses (Shukla et al., 2012). Moreover, the intellectual property theft can lead to excessive cost and can damage the reputation of the organization or its product. The thief or cyber criminals can copy the concepts of other for the benefits of its own or for their business in order to gain higher profit margin. Further, the creative expressions, ideas and inventions are being robbed so that it can be implemented in their business strategies for better development. Thus, the organized criminals can gain high profit by conducting the crime (Ncpc.org, 2015). Solution In order to prevent the challenges of intellectual property theft, the business person can employ digital signatures or digital identities so that any criminal or theft cannot access or break the security wall. This would help in protecting the information or ideas or concepts in safest way. On the other hand, certified information security experts can be recruited so that confidential information can be protected from the potential threat (Silver, 2013). Moreover, the information security technologies can be used such as encryption, intrusion detection, strong authentication devices, firewalls, etc. Apart from that, the organization can educate and train their workforce in order to handle and monitor the intellectual property robbery. Problem 3: Child soliciting and abuse It is also considered as one of the cyber crime where the cyber criminal focuses on the children by inviting them to chat rooms for the child pornography purpose. This affect the mind of the child and child can become more inclined towards the pornography and can damage the future growth of child that can ultimately affect the growth of future society (Martin and Rice, 2012). Moreover, the child may not be able to focus on the study and their career. Apart from that, the cyber criminals can use the network or internet for harassing the child or for cyber bullying. It can damage the morale of child or it can make child more aggressive and can lead to negative behavior in the child. Further, it creates anxiety, depression, and negative social views among the children that can disturb the psychology of the child (Wykes, 2007). On the other hand, the sex offender can be after the child and can take the picture of child from social site and place in some pornography sites that can be dang erous for the child future development. Moreover, the criminals can seek information about where the child lives and it may not be safe for them (Orlov, 2012). Solution The cyber departments in different nations can invest their time in monitoring numbers of chat rooms that are most used by children as it can help in protecting the child from any abuse or soliciting. On the other hand, the carers, parents or teachers have to remain aware that the child is not into sexual violence (K. Sindhu, 2012). Moreover, the parents or teachers should block the offending websites so that children may not access those sites and not fall into sexual abuse or harassment via online. Apart from that, the pictures of children should not be posted or sent to unknown person either via Facebook, Twitter or Myspace, etc so that any criminal may not use the pictures falsely. This would protect the child from child abuse or online bullying. The other solution that can be adopted by victims is that they can file a case against the criminal that is continuously conducting the activities even after given warning (Kumar and Mittal, 2012). Therefore, it can put a stop to child a buse and criminals can be sentenced to prisoner. On the other hand, an international coalition of groups and people can be formed to action against the misuse of internet. The cyber crime department has to enforce law to track the illegal activities carried by the cyber criminals on greater extent. Moreover, the public awareness has to be enforced so that people can become aware about the illegal use of internet (Crossdomainsolutions.com, 2015). Conclusion The cyber crime is a potential threat for the society. The cyber crime is increasing at rapid pace which is affecting the privacy of the individual and breach into the system security. The three problems that has been mentioned hacking, theft and child soliciting and abuse is hampering the mental health of the people and affecting the activities. The hackers can hack the important information of the individual therefore; the hackers need to be tracked and same goes with other cyber issues. The awareness about the cyber crime has to be promoted so that people can become more alert towards the use of internet or system. Therefore, in that case some solution has been mentioned to limit the affect of cyber crime. References Alliance, B. (2015). B4USurf - Types of Cybercrime. [online] B4usurf.org. Crossdomainsolutions.com, (2015). Cyber Crime Types Preventive Measures. Sindhu, K. (2012). Digital Forensics and Cyber Crime Datamining. Journal of Information Security, 03(03), pp.196-201. Kumar, P. and Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal of Technoethics, 3(1), pp.43-52. Martin, N. and Rice, J. (2012). Children's cyber-safety and protection in Australia: An analysis of community stakeholder views. Crime Prev Community Saf, 14(3), pp.165-181. Ncpc.org, (2015). Intellectual Property Theft: Get Real National Crime Prevention Council. Orlov, V. (2012). CYBER CRIME: A THREAT TO INFORMATION SECURITY. Security Index: A Russian Journal on International Security, 18(1), pp.1-4. Shukla, D., Verma, K., Bhagwat, S. and Gangele, S. (2012). Curve Fitting Analysis of Internet Traffic Sharing Management in Computer Network under Cyber Crime. International Journal of Computer Applications, 47(24), pp.36-43. Silver, J. (2013). 20 ways to keep your internet identity safe from hackers. Wykes, M. (2007). Constructing crime: Culture, stalking, celebrity and cyber. Crime, Media, Culture, 3(2), pp.158-174.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.