StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Urgent Issues in Cybercrime - Assignment Example

Cite this document
Summary
The assignment "Urgent Issues in Cybercrime" focuses on the critical analysis of the major issues in the need for a proper and functional intrusion system to be used to mitigate cybercrime. It is a fundamental requirement that everyone gets to understand the risks associated with information flaws…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Urgent Issues in Cybercrime
Read Text Preview

Extract of sample "Urgent Issues in Cybercrime"

Regions that require high security are those with valuable items, potentially dangerous materials, and information. The ease of intrusion depends on the security system used. It is essential that the system implemented meets the intended function. The system’s function should be carefully monitored to understand its weakness and strengths. The understudy company uses security guards at the entrance, but once someone is within the building, he or she is free to roam around. Although there are cameras and motion sensors, they are deactivated during the day and are fewer in number. During the installation of these security items, distribution was not taken into consideration. The weakness, therefore, is the deactivation and distribution. Furthermore, the company lacks offsite monitoring; this offers an opportunity for an intruder to access a restricted area and escape before being noticed. Craighead suggests that “in the case of offsite monitoring, once notified of an intrusion alarm, the central station staff will either notify security staff at the building” (2009, p. 310).

Insecurity over secured places is often critical. Aside from the presence of security personnel, the most appropriate additional system is the use of technology. An intrusion system is quite an effective security solution. Intrusion systems offer security alerts to security guards and other responsible individuals. The intrusion alert systems incorporate infrastructure that provides adequate security requirements. According to Barnard, “a physical security system consists of four equally important interacting functions: delay, detect, alert and respond” (1988, p. 1). The whole complete system is worthy of adequate security.

The information revolution mirrors the advancement of computerized information and the growth in communication technologies. Arguments show that information is turning into a strategic resource that is valuable and has great influence in the current industrial age (Arquilla & Ronfledt, n.d.). History has shown that military doctrines have continually passed through changes rallied behind technological evolvement; with this growth, crime has also found its way into the greater use of technology to match the advancing security technologies. To this height, it has seen this competition move to cyberspace and its related networking.  According to Andress and Jason, cybercrime has been defined as a “notional environment in which digitalized information is being communicated over computer networks” (2013, p. 3).

There are two given articles narrating about cybercrime: A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here, and Thinking Again: Cyber War. The explanations of the two articles are intensive, reflecting the extent and potentiality of cybercrime. However, I find that “Thinking Again: Cyber War” an article by Rid has arguably brought out what cybercrime entails as compared to “A Stuxnet Future? Yes, Offensive Cyber-Warfare is Already Here” (2012) which in itself, has argued that actors can cause cyber damage even without an internet connection.

Further reasons prompting my suggestion that the article by Rid (2012) has deeply dealt with cybercrime is its constant use of appropriate examples, the case citation is Estonia ordeal. As explained in April 2007, the well-networked country was a victim of intrusion; it had several of its websites attacked including the online banking services. As for Stuxnet crime, Rid (2012) has extensively explained it putting it in the context of cyber criminality; the article explains that “all the functionality required to sabotage a system was embedded directly in the Stuxnet executable” (n.p.).

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 2 Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 2 Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652926-week-2
(Week 2 Assignment Example | Topics and Well Written Essays - 500 Words)
Week 2 Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652926-week-2.
“Week 2 Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652926-week-2.
  • Cited: 0 times

CHECK THESE SAMPLES OF Urgent Issues in Cybercrime

Cybercrime and Privacy

Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy.... The issue of cybercrime, has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U....
9 Pages (2250 words) Research Paper

Cybercrime - Illegitimate Use of Internet

As the paper "cybercrime - Illegitimate Use of Internet" tells, computer technologies and the internet have become essential elements in the day-to-day life of individuals.... Illegitimate uses of these services through the internet, as a source of adequate information and economically beneficial way of communication, have become a prime cause of criminal activities over the internet, commonly referred to as 'cybercrime'.... The origin of cybercrime can be attributed to the technological advancements of the late 1980s and the 1990s....
9 Pages (2250 words) Research Paper

The Essence of Cybercrime

In recent years, cybercrime has evolved.... here are two types of cybercrime.... In the current era of globalization and the digital era, the world operates as a global village.... The level of technology distinguishes developed to developing countries.... A country's development in science and....
5 Pages (1250 words) Essay

Is there Relationship between Video Games among Children and Violent Behavior

It discusses violent video contents such as shooting to the behavior of boys who watch them on video games and also covers how cybercrime has raised issues.... It elaborates on different social sectors and businesses that face the damaging effects of cybercrime.... Moreover, it highlights the weaknesses in the legislation be in place to mitigate cybercrime.... hilip outlines his contributions to current environmental issues that affect human health....
3 Pages (750 words) Assignment

Cyber Security and Business Law

The author of the paper 'Cyber Security and Business Law' states that cybercrime is disastrous for an organization due to its negative implications.... Major retail stores such as Target have reported incidences of cybercrime.... ne of the major issues of concern in cyberspace security is privacy....
5 Pages (1250 words) Research Paper

Issues of Cybercrime in the United Kingdom and the United Arab Emirates

The paper "Issues of cybercrime in the United Kingdom and the United Arab Emirates " is an excellent example of a term paper on the law.... In comparison to cybercrime law in the United Kingdom (UK), cybercrime legislation in the United Arab Emirates (UAE) is challenged by various ideological inadequacies especially in dealing with cyber victimization.... The paper "Issues of cybercrime in the United Kingdom and the United Arab Emirates " is an excellent example of a term paper on the law....
10 Pages (2500 words) Term Paper

Cyber Crime in the United Arab Emirates

cybercrime is a comparatively modern type of offence with which the offenders can easily carry out the offences through the use of a computer or even through smartphones.... ackground of the StudyLegal system all over the world is experiencing huge challenges in a plight to discourse the issue of cybercrime.... cybercrime is considered a very quickly growing domain of crime that is complicated and assorted in nature (Kersten and Jansen 590).... There are a number of cybercrimes and they include attacks on computers, cyber-bullying, email spam and phishing, identity theft, cyber-attacks, hacking, sexting, online scam or fraud as well as online trading issues to name a few (EFG 9)....
8 Pages (2000 words) Report

Future Cyber Security Crimes

laper and Hovy (2014) note that immediate history related to cybercrime is documented haphazardly.... In the course of the 1990s, the emergence and fast-distribution of the internet resulted in an accelerated increase in the level of cybercrime.... .... ... ... The paper "Future Cyber Security Crimes" is a wonderful example of a research paper on the law....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us