Academia.eduAcademia.edu

Outline

Proposals to Win the Battle Against Cyber Crime

2015, Handbook of Research on Threat Detection and Countermeasures in Network Security

https://doi.org/10.4018/978-1-4666-6583-5.CH008

Abstract

Through commercial networks and across the Internet, there are data files, millions of images and videos, and trillions of messages flow each day to drive the world economy. This vast electronic infrastructure is what our nation depends on. To commit crime by using a computer and communication to forge a person's identity, illegal imports or malicious programs, the computer here is used as an object or subject for the cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety just as effectively as common everyday crimes. This chapter concentrates on explaining and discussing the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and future trends have been forecasted, and at the end of the chapter a conclusion will be given.

FAQs

sparkles

AI

What are the major categories of cyber crime identified in research?add

The study identifies two main categories of cyber crime: exploitation of operating system vulnerabilities and manipulation of social networks, emphasizing the complexity of these offenses.

How has the growth of technology facilitated cyber crime?add

The paper reveals that widespread computer and communications usage has removed physical limitations, enabling criminals to execute acts from remote locations.

What does the 'Blue Lake' theory imply about cyber crime?add

The 'Blue Lake' theory suggests that economic impacts of cyber crime vary significantly, influencing organizational roles and responsibilities in managing risks.

How effective are current security measures against cyber attacks according to the findings?add

Research indicates that 90% of the internet consists of vulnerabilities, while only 10% remains secure, highlighting inadequate current security measures.

What role does anonymity play in cyber crime behavior?add

The study notes that the anonymity provided by computers has transformed criminal behaviors, facilitating acts previously unattainable in society.