CyberCrimes Cyber Prevention
CyberCrimes Cyber Prevention
CyberCrimes Cyber Prevention
Introduction
Cybercrime has been a hot button topic in recent years. A crime involving digital services
or computers, cybercrimes typically is when someone targets a computer for a crime, uses a
computer as a tool for a crime, or has computer containing evidence of a crime. Since the rise of
information technology, cybercrime has become taken center stage as a shift in criminal activity
means more criminals doing business online and using computers or attacking computers as a
result of it. Criminal investigators and law enforcement have thus begun efforts to control
prevent and investigate cyber activities to avoid major problems for the Government, agencies,
organizations, and individuals. As one article put it, it is a battleground. “The digital world has
become a battleground for the forces of good and evil. There is an ever increasing awareness that
the digital world provides an unlimited opportunity to further one’s goals” (Gregory & Glance,
2013, p. 51).
A way law enforcement is tackling cybercrime is through the hiring and retention of
highly skilled cybercrime experts via business enterprises and Government. This guarantees
technological devices and computer in private and in work places. Although emphasis must be
placed on prevention measures, control and investigation measures are vital as well in
In case of any breaches, forensics experts must be called as they are the ones to conduct
the necessary forensic examinations, analysis, reconstruction, and documentation of any crime
scene, presenting evidence to the Court and other appropriate authorities that may lead to the
arrest, prosecution, and conviction of the suspected criminal. Another aspect of cybercrime aside
from breaches are digital assets. Certain private information like social security numbers and tax
information can easily become stolen and lead to identity fraud. These kinds of digital assets
must be safeguarded. Therefore, research needs to point towards new and innovative strategies to
CCC deals with the development of sufficient policies to help control cybercrime
activities. Any policies developed must spell out suitable punishment for convicted cyber
criminals. Convictions are as a result of court verdicts and will act a deterrent measure for any
CCP involves emphasis on the training of administrators and users of cyber space,
security awareness, best practices and so forth to avert and minimize the occurrence of cyber
incidents. Underground hacking techniques while the cause of some cybercrimes can help
security managers and administrators understand how criminals works, thereby helping prevent
cybercrime. To think like a hacker is to use the techniques and tools hackers use thereby helping
to expose the various ways of detecting and thwarting cybercrime activities through training and
education. Recognition of users as the weakest link is paramount since that is where most of the
damage is done. “A solution out of this dilemma is a cyber-security policy decidedly anti-
vulnerability and at the same time based on strong considerations for privacy and data protection.
Such a security would have to be informed by an ethics of the infosphere” (Dunn Cavelty, 2014,
p. 701).
The types of tools that will aid in these efforts are open source and commercial tools that
Victimology is the study of any victim of crime as well as the psychological effects they
have or are imposed on them.
2. Victimology may not always mean an individual. It can be a bank, website, ministry,
server, agency, or any other target (Doerner & Lab, 2014).
Work related
Hobby related
Work related
Family related
Analysis of the victim helps reveal the reason behind the choosing of the victim and the
level of risk the offender took to acquire the victim.
Victimology research includes a thorough search for evidence, including cyber trails.
Cyber trails are often an important way to obtain valuable information that can later
undermine an offender and lead to their arrest and subsequent conviction.
and Government. The aims are to discover ways to reduce cybercrime activities and existing
laws and amendments that were made to appropriately punish cyber criminals along with other
deterrent measures that have been or will be used to reduce cybercrime. Lastly the objective is to
develop a strategy for effectively tracking cyber criminals through application of research driven
cyber forensic techniques and how victims can report crimes and how the FBI website and the
Research Questions
These questions are meant to provide a means of exploring the current information available and
What are we trying to protect? What needs protection are several. They are availability
network, assets, network infrastructure, confidential personal data, resources that can be
Why are intrusions so often successful? As stated earlier, the users are the weakest link in the
security chain. Users often fail to perform the actions necessary to avoid becoming a target for
cyber criminals. Things like no firewall, password sharing, simple passwords, ignorance of
organizational and/or logical boundaries in a network infrastructure along with numerous things
can create weakness and increase risk for breach. Research and implementation of best practices
will not 100% prevent cyberattacks, but will lessen the rate in which cybercrimes are performed.
What are the greatest challenges that we face today? Some of the challenges faced to day like
constant innovation and new technology, and environment complexity create further exploits and
threats because once one strategy is learned and implemented, the cybercriminal will have
learned of a new way to make a successful breach, bringing things back to square one. Now with
the use of mobile phones and the increase in mobile technology via mobile apps and
smartphones, cyber threats have increased. There has to be a trade off somewhere so technology
can still be innovative, but at the same time allow more time to develop better security. Rapid
improvements have set trigger to rapid growth of cybercrimes as detailed in a 2014 article.
information quickly from physical area to electronic/digital area, cyberspace has caused
to emerge a lot of threats and methods like cyber-attack, cyber-crime, cyber war which
Why are most attacks gone undetected? The majority of companies and organizations are not
aware if that have experienced a cyberattack. This is alarming news. It is one thing when
someone knows they are being hacked. It is another when the cyberattack goes unnoticed leaving
room for additional cyberattacks and problems like the comprising of security via leaked
confidential information. One of the biggest reasons is lack of skilled personnel, trained
specifically in incident response and cyber security. While there is available funding for schools
to train IT professionals, there not enough IT students in school, leading to a severe deficit and
enough blind spots for hackers to commit their cybercrimes. “Against ever evolving cyber-
threats the need to graduate students skilled in the concepts and technologies of cyber-security is
sovereignty of the US and her allies” (Rowe, Lunt, & Ekstrom, 2011, p. 1).
Why are attackers not getting appropriate jail terms? This is a problem that is on the way to
being resolved with stricter and more stringent laws and policies being added to ensure proper
punishment is given to convicted cybercriminals. However, the process is a slow one, especially
when it comes to global cybercrime. While American cybercrime laws enforce at times jail time
and heavy financial penalties, global cybercrime laws are not as stringent as seen with Chinese
hackers hacking into the United States. The United States government could not interfere as the
attacks were performed while the hackers were abroad. What can be done however, to deal with
global cyber and what has been done successfully is the use and implementation of financial and
trade sanctions This is because they offer seemingly proportional response as well as a more
palatable approach than either inaction or military intervention. After the Sony attacks problem,
sanctions were issued against North Korea. “In April 2015, President Obama issued an executive
order that laid the groundwork for more active use of economic sanctions against Chinese,
Russian, Iranian, and North Korean hackers, as well as nonstate actors” (Segal, 2016, p. 95). By
President Obama doing this, he enabled the Treasury secretary to sanction entities as well as
individuals with punishments that could entail the freezing of any financial assets including the
barring of any commercial transactions. This keeps foreign countries from hacking because it
hits them where it hurts, money and assets. This is just one step however, in a ladder that
What are the motivations for the cybercriminals? While cybercriminals frequently perform
illegal activities for monetary gain, there are many who do it for other reasons. Some may do it
for personal reasons. Some may do it for political reasons. Whatever the reasons are,
investigating such reasons can lead to the thwarting of such efforts by understanding the source
‘hacktivist party’ by the name of Podemos hacked in order to extend their political aims to the
masses. “They are a political party that is using the rules of cyber-activism and the hacker culture
to create and set up another political model- more democratic, transparent, and collaborative.
Hacktivism is the emergence of popular political action, of the self-activity of a group of people,
What risk is the attacked willing to take in other to get the target? This is often understood
in relation to the gains. If there is a lot of money at stake or political expression that is deeply
important to the hacker, the cybercriminal may be willing to risk jail time in order to get their
target. This is seen several times in the United States where hackers caught are often asked why
they committed the crime and they told them they wanted to because of such and such and were
How can we tie the loose ends and make our cyber space more secure than it currently is?
This is difficult to answer. However, the most important thing is to improve the way IT students
learn and absorb the curriculum so they can become IT professionals and provide the assistance
so desperately needed in this area. Perhaps by adapting a holistic approach, the ball could get
rolling when it comes to reaching out to students and readying them for a successful career in IT
and cybersecurity.
Observations of the healthcare model, along with the findings of a recent workshop on
cybersecurity education, suggest some practical steps for such an approach. Computer science
educators, human resources professionals, and cybersecurity practitioners should seek to attract
computer science graduates to think beyond their stovepiped fields and collaborate to develop,
accept, and implement holistic, integrated solutions (Hoffman, Burley, & Toregas, 2012, p. 33).
The world of cybercrime is fast-pace. It is a constant struggle to try and stay afloat and
cybercriminals find new ways to hack and break into computer systems, stealing precious and
sensitive information. The worst part is, many organizations, business, and individuals are not
even aware they are being hacked. This leaves many blind to the true dangers of the cyber world.
However, there are ways to prevent and thwart would be hackers. Cybersecurity
professionals and educating users are key ways to undermine hackers. By users learning to
protect themselves, they can make it harder for hackers to access their computer and their private
information. By having more cybersecurity professionals, hackers can be found, caught, and
prosecuted.
The American government has also made great progress in dealing with global
cybersecurity threats. By issuing financial sanctions they hit countries like China and North
Korea where it hurts, their assets and capital. While this is one step, it is an effective step
towards reducing cybercrime activities. Lastly, cybersecurity professionals are an essential part
of controlling, preventing, and investigating cybercrimes, but there is a big shortage of them.
That is because IT students are not graduating at the amount needed. Schools and educators must
focus in properly preparing IT students so they can pursue a career in cybersecurity once
they graduate. That may take a holistic approach. A holistic approach depends on a
concerted effort to achieve the almost insurmountable goal of closing the gap.
Dunn Cavelty, M. (2014). Breaking the Cyber-Security Dilemma: Aligning Security Needs and
http://dx.doi.org/10.1007/s11948-014-9551-y
2014. http://dx.doi.org/10.1117/12.2053356
Gregory, M. & Glance, D. (2013). Cyber Crime, Cyber Security and Cyber Warfare. Security
Hoffman, L., Burley, D., & Toregas, C. (2012). Holistically Building the Cybersecurity
http://dx.doi.org/10.1109/msp.2011.181
Rowe, D., Lunt, B., & Ekstrom, J. (2011). The role of cyber-security in information technology