Proposals to Win the Battle Against Cyber Crime
2015, Handbook of Research on Threat Detection and Countermeasures in Network Security
https://doi.org/10.4018/978-1-4666-6583-5.CH008Abstract
Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.
FAQs
AI
What are the major categories of cyber crime identified in research?
The study identifies two main categories of cyber crime: exploitation of operating system vulnerabilities and manipulation of social networks, emphasizing the complexity of these offenses.
How has the growth of technology facilitated cyber crime?
The paper reveals that widespread computer and communications usage has removed physical limitations, enabling criminals to execute acts from remote locations.
What does the 'Blue Lake' theory imply about cyber crime?
The 'Blue Lake' theory suggests that economic impacts of cyber crime vary significantly, influencing organizational roles and responsibilities in managing risks.
How effective are current security measures against cyber attacks according to the findings?
Research indicates that 90% of the internet consists of vulnerabilities, while only 10% remains secure, highlighting inadequate current security measures.
What role does anonymity play in cyber crime behavior?
The study notes that the anonymity provided by computers has transformed criminal behaviors, facilitating acts previously unattainable in society.