StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Fraud And Cyber Terrorism - Research Paper Example

Cite this document
Summary
Fraud activities have in the recent times increased as many people are desperate and are engaging themselves in crime as they try to make ends meet and hence participating in the acts of fraud in their work places and other institutions…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.6% of users find it useful
Fraud And Cyber Terrorism
Read Text Preview

Extract of sample "Fraud And Cyber Terrorism"

Download file to see previous pages

Fraud prevention includes acts such as scheming corporate fraud policies, introducing internal audit departments, implementing internal controls and whistle-blower systems. The strategic method of fraud is an efficient technique to detect and illustrate both known and unidentified frauds. When implemented proactively to identify unknown fraud, it depicts laser-like precision that allows for much more efficient investigation. (Sanjay Goel. 2010). Cyber terrorism threat Cyber terrorism is the act of illegally accessing computers and information chiefly via the internet to create physical harm or severe disturbance of infrastructure.

Cyber terrorism could scholarly be defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives.” Efforts of dealing with cyber terrorism Agencies that deal with fraud such as Interpol and the FBI are doing a great job in fighting against cyber terrorism. Interpol in its part is assisting all the member countries and training their personnel to equip themselves with the current trends and forms of fighting cyber terrorism.

The Council of Europe Convention on Cyber Crime, which is the first international treaty for fighting against computer crime, is the product of a 4 years work by experts from the 45 member and non-member states that include Japan, USA and Canada. The treaty has already imposed after its endorsement by Lithuania on 21st of March 2004. (Achkoski, J., & Dojchinovski, M. 2011) How to try to avoid cyber terrorism With the ever changing trends in the cyber technology sector, there are no foolproof methods to protect a system.

To say that you have a completely secure system, then it means that it can never be accessed by anyone. Even in most military set up, top secret information is kept on servers with no outside connection as a form of deterrence of cyber terrorism. Another common way that cyber terrorism can be avoided apart from such isolation is encryption. The wide spread use of encryption is repressed by most states ban on its exportation thus its intercontinental communication is left somewhat unsecured. (Kapodistria, H.

, & Christos D. 2011) Other internet users tend to encourage the use of firewalls to screen all communications to a system including e-mail messages, which may carry “logic bombs.” Firewall is a somewhat generic phrase for methods of filtering admittance to a network. Firewalls tend to define the services and access that is allowed to each user. Judicial repercussions on cyber threats  Since the Internet "is a cooperative venture not owned by a single entity or government, there are no centralized rules or laws governing its use?

” The lack of geographical restrictions may give rise to a state of affairs where an act that may be deemed legal in one country turns out to be illegal in the other. (Jewkes, Y., & Yar, M. 2010). In general, most internet users tend to relate to the following "theories" under which a country may assert regulatory jurisdiction: (a) A country may assert jurisdiction based on "objective territoriality" when an illegal activity occurs within the country. (b) A country may assert jurisdiction based on the nationality of the wrong doer. (c) A country may assert jurisdiction based on the right to defend the nation's sovereignty when faced with terrorization acknowledged as serious in the international community.

Conclusion The predicament of cyber terrorism and fraud is involves many

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1484144-week
(Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 Words)
Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1484144-week.
“Fraud And Cyber Terrorism Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1484144-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Fraud And Cyber Terrorism

Cybercrime Issues Discussion

The second issue that relates to cyber crimes is that of cyber terrorism.... Therefore, the threat of cyber terrorism can include any and all firms that deal with an entire litany of different industries and/or businesses.... In order to guard against the threat of cyber terrorism, it should be the goal of the firms in question to seek to review their security policies in dept on a quarterly and yearly basis as a means of ensuring that key oversights are addressed and no blatant flaws are exhibited in their systems....
3 Pages (750 words) Essay

Cyber Threat in a Finance Organisation

This paper “cyber Threat in a Finance Organisation” will try to shed light on pertinent issues regarding identity fraud in the financial organization through cyberspace.... Identifying the loopholes in the existing regulatory framework for cyber crime will be the essence of the second part of this report.... In the final part, the paper will try to recommend a viable solution which can at least decrease the magnitude of cyber threat in terms of identity fraud for financial organizations....
12 Pages (3000 words) Essay

Links between Domestic Terrorist Groups and International Terrorist Groups

The Second way in which terrorist use the internet for their terrorism is that individuals, as well as groups, have attempted to make an attack on a lot of computer networks, as well as those on the Internet this is called cyber terrorism or cyber warfare.... The author concludes that terrorism is something which affects all of mankind, as the people who run these organizations are ruthless, they have been blinded and brainwashed.... hellip; After analyzing the above differences it can be said that international terrorism is a greater threat as these groups do not operate within the country, and thus they are even more difficult to stop....
11 Pages (2750 words) Term Paper

Components of Cyber-Terrorism

Following are some of the reasons for the recent growth in cybercrime and cyber attacks- All terrorist organizations on the web are now using it as a means to broadcast their philosophies and messages across the world, and thereby misguiding and misinforming people from many nations.... This essay "Cyber-terrorism" is about the mingling of cyberspace with terrorism.... However, the increasing influence of cyberspace has extended into the area of terrorism....
8 Pages (2000 words) Essay

Computer Crime and Cyber-Terrorism

The paper “Computer Crime and cyber-Terrorism” seeks to evaluate online crime, which has now become a multi-billion dollar business.... Hackers are becoming increasingly sophisticated in the means they use to get users to disclose confidential financial and personal information....
8 Pages (2000 words) Essay

The Dangers of Cyber-Terrorism

In the paper “The Dangers of Cyber-Terrorism” the author discusses cyber terrorism, which entails two major aspects: cyberspace and terrorism, allowing it to be considered as the usage of information technology by terrorist organizations.... The risk of cyber terrorism is extremely genuine and incredibly hazardous.... The intelligence strategies, safety strategies, and devices which are designed to shield us, now are immobilized against this latest disastrous tactic, known as cyber terrorism....
5 Pages (1250 words) Research Paper

Digital Crime and Digital Terrorism

This report "Digital Crime and Digital terrorism" demonstrates digital criminals and digital terrorists that have beneficiated greatly by the use of information technology due to safer means of communication.... Digital crime and digital terrorism are growing at an increasing rate as the variety and the frequency of the offenses are increasing and also since more dangerous crimes are being committed using little physical resources.... The introduction and improvement of information technology throughout the world have led to the growth of terrorism and transnational crime where criminals hire specialists to do illegal transactions through the use of information technology (Baggili, 2011)....
6 Pages (1500 words) Report

Cyber Crime: Investigating Cyber Terrorism

The following are some of the criminal activities regarded as Cyber Crimes: Online Fraud, Spam, Cyber Bullying, Piracy, and cyber terrorism.... "Cyber Crime: Investigating cyber terrorism" paper looks at cyber terrorism in detail.... cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities.... nbsp;cyber terrorism refers to the use of Information Technology-based attacks in terrorist activities (Matusitz, 2005)....
10 Pages (2500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us