Computer and Internet Crimes: Rank Valuable Information
Computer and Internet Crimes: Rank Valuable Information
COMPUTER AND INTERNET CRIMES make up the top three (3) most valuable information that
organizations would like to protect as shown in Table 1.
• Confidential business data and private customer and employee • In the same conducted survey, Table 2 shows that the most
information must be safeguarded, and systems must be protected successful cybercrimes contain phishing and malware as starting
against malicious acts of theft or disruption. points. Attacks focused on disruption and stealing money rank
• Although the necessity of security is obvious, it must often be third and fourth.
balanced against other business needs and issues. • Computer crime is a crime that is executed using computers or
• Business managers, IT professionals, and IT users all face networks of computers. It is done to damage people’s or
several ethical decisions regarding IT security. organizations’ reputation. Some of the ways computer crimes
p pose threats are as follows:
Rank Valuable Information − Threat to an individual
1 Customer information (17%) − Threat to an organization
2 Financial information (12%) − Threat to groups
3 Strategic plans (12%)
− Threat to a nation
4 Board member information (11%)
5 Customer password (11%)
6 Research and development (R&D) information (9%)
Why Computer Incidents are Prevalent
7 Mergers and acquisition (M & A) information (8%) • Increasing Complexity Increases Vulnerability
8 Intellectual property (6%) - The number of possible entry points to a network expands
9 Non-patented (5%) continually as more devices are added, increasing the
10 Supplier information (5%) possibility of security breaches.
Table 1. Top 10 most valuable information to criminals (2018–2019 Global survey) • Higher Computer User Expectations
Source: https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey- - Time means money. The earlier the active computer
2018-19/$FILE/ey-global-information-security-survey-2018-19.pdf
users can resolve a problem, the more productive they
can be. As a result, computer support desks are under
Rank Cyber threats extreme pressure to counter very instantly to user’s
1 Phishing (22%) questions.
2 Malware (20%) • Technological Advancement Introduce New Risks
3 Cyberattacks (to disrupt) (13%) - With expanded business needs, globalization,
4 Cyberattacks (to steal money) (12%)
collaborative working, and new technological
5 Fraud (10%)
breakthroughs today, information is being shared on
6 Cyberattacks (to steal IP) (8%)
7 Spam (6%) networks with millions of other computers.
8 Internal attacks (5%) • Increase Reliance on Commercial Software with Known
9 Natural disaster (2%) Vulnerabilities
10 Espionage (2%) - Many companies are increasingly relying on commercial
Table 2. Top 10 biggest cyber threats to organizations software with known vulnerabilities. Even when
Source: https://www.ey.com/Publication/vwLUAssets/ey-global-information-security-survey- vulnerabilities are exposed, many corporate IT
2018-19/$FILE/ey-global-information-security-survey-2018-19.pdf organizations prefer to use already installed software “as
• According to EY Global Information Security Survey 2018–2019, is” rather than implement security fixes that will either
customer information, financial information, and strategic plans make the software harder to use or eliminate “nice-to-
have” features suggested by current users or potential - The program’s harmful payload can enable the
customers, which will help sell the software. hacker to destroy hard drives, corrupt files, control the
• Bringing your own device (BYOD) policy computer remotely, launch attacks against other
- Employees access company data by using their devices computers, steal passwords or social security
such as mobiles, tablets, and personal laptops to have all- numbers, and spy on users by recording keystrokes
time availability and connection with the work, which and transmitting them to a server operated by a third
generates a security threat. party.
• Delay in software updates 4. Botnets
- Most organizations do not understand the upcoming risks - A botnet is a large group of computers controlled from
and delay software updates for multiple reasons such as one or more remote locations by hackers, without the
time shortage, extra cost involved, or just negligence, knowledge or consent of their owners.
making the organization’s computer vulnerable to attack. - This is frequently used to distribute spam and
malicious code.
Types of Exploits 5. Distributed Denial-of-Service (DDoS) Attacks
In computing, an exploit is an attack on an information system that - A DDoS happens when a malicious hacker takes over
takes advantage of a particular system vulnerability due to poor computers on the Internet and cause them to flood a
system design or implementation. target site with demand for data and other small tasks.
- A DDoS attack does not involve infiltration of the
Types of Computer Attacks targeted system. Instead, it keeps the target so busy
1. Viruses responding to a stream of automated requests that
- A virus is a piece of programming code, usually legitimate users cannot get in – the Internet
disguised as something else, that causes a computer equivalent of dialing a telephone number repeatedly
to behave unexpectedly and often undesirably. so that all other callers hear a busy signal.
- It is spread to other machines when a computer user 6. Rootkits
opens an infected file or visits infected Web sites. - A rootkit is a set of programs that enables its user to
2. Worms gain administrator-level access to a computer without
- A worm is a harmful program that resides in the active the end user’s consent or knowledge.
memory of the computer and duplicates itself without - Attackers can use the rootkit to execute files, access
human intervention. logs, monitor user activity, and change the
- The negative impact of a worm attack on an computer’s configuration.
organization’s computer can be considerable – lost 7. Spam
data and programs, lost productivity due to workers - E-mail spam is the abuse of e-mail systems to send
being unable to use their computers, additional lost unsolicited e-mail to large numbers of people.
productivity as workers attempt to recover data - Most of the spam are a form of low-cost commercial
programs, and lots of effort for IT workers to clean up advertising, sometimes for questionable products
the mess and restore everything to as close to normal such as pornography, phony get-rich-quick schemes,
as possible. and worthless stock.
3. Trojan Horses 8. Phishing
- A Trojan horse is a program in which malicious code - Phishing is the act of using e-mail fraudulently to try
is hidden inside a seemingly harmless program. to get the recipient to reveal personal data.
- Installing a corporate firewall – A firewall stands as possible intrusions from outside the organization or misuse
guard between an organization’s internal network and from within the organization.
the Internet. It also limits network access based on
the organization’s access policy. Response
- Intrusion prevention systems (IPSs) – These work to • A response plan should be developed well in advance of any
prevent an attack by blocking viruses, malformed incident and be approved by both the organization’s legal
packets, and other threats from getting into the department and senior management.
protected network. • Sample response plan:
- Installing Antivirus Software on Personal Computers - Incident notification – It defines who to notify and who
– Antivirus software scans for a specific sequence of not to notify
bytes, known as a virus signature, that indicates the - Protection of evidence and activity logs – It
presence of specific viruses. If it finds a virus, the documents all details of a security incident as it works
antivirus software informs the user, and it may clean, to resolve the incident
delete, or quarantine any files, directories, or disks - Incident containment – It acts quickly to contain an
affected by the malicious codes. attack and to keep a bad situation from becoming
- Implementing safeguards against attacks by even worse
malicious insiders – Organizations need to define - Eradication – Before the IT security begins the
employee roles carefully and separate key eradication effort, it must collect and log all possible
responsibilities properly so that a single person is not criminal evidence from the system. Then it must verify
responsible for accomplishing a task that has high that all necessary backups are current, complete, and
security. free of any virus.
- Addressing the most critical internet security threats - Incident follow-up – An essential part of follow-up is
– The actions required to address these issues to determine how the organization’s security was
include installing a known patch to the software and compromised so that it does not happen again.
keeping applications and operating systems up to
REFERENCES:
date. Those responsible for computer security must Bott, F. (2005). Professional issues in information technology. UK: British
make it a priority to prevent attacks using these Computer Society, Ltd.
vulnerabilities. Kessel, P. (2019). Is cybersecurity about more than protection? EY Global
- Conducting periodic IT security audits – Security Information Security Survey 2018-19. Retrieved from
audit is a prevention tool that evaluates whether an https://www.ey.com/Publication/vwLUAssets/ey-global-information-
organization has a well-considered security policy in security-survey-2018-19/$FILE/ey-global-information-security-survey-
2018-19.pdf
place and if it is being followed (e.g., password policy,
Quinn, M. (2014). Ethics for information Age (6th Ed.). USA: Pearson.
system access, and level of authority). Reynolds, G. (2010). Ethics in information technology (3rd Ed.). Boston, USA:
Cengage Learning.
Detection
• An intrusion detection system is a software and/or hardware
that monitors system and network resources and activities. It
also notifies network security personnel when it identifies