StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Role of Cyber Security in Controlling the National Threat of Cybercrime - Report Example

Cite this document
Summary
This report "Role of Cyber Security in Controlling the National Threat of Cybercrime" discusses cybercrime has become a critical threat that has been affecting organizations and individuals in different nations. Cybercrime can bring about certain physical or mental harm to individuals…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Role of Cyber Security in Controlling the National Threat of Cybercrime
Read Text Preview

Extract of sample "Role of Cyber Security in Controlling the National Threat of Cybercrime"

? Role of Cyber Security in Controlling the National Threat of Cybercrime Table of Contents Introduction 3 3 Motivation of the Actors 4 Role of CyberSecurity 5 Suggested Methods to Stop Cybercrime 8 Conclusion 9 References 11 Introduction In recent times, it is observed that information technology has been developing rapidly. In relation to this growth, it is also recognized that cybercrime is also increasing day-by-day. Cybercrime can be defined as the offences committed by certain individuals by accessing different personal and organizational data stored in computers primarily with the help of internet (International Telecommunication Union, 2009). The convict individuals are known as hackers. Generally, hackers hack others computers with the help of internet for stealing organizational and personal information without any authorization in order to cause certain mental or physical harm to the victim in present or in future. In recent years, the role of cyber security has become quite prominent as has been identified by different nations and organizations throughout the world. Cyber security can play a vital role in order to identity the attempt of any such malicious activities by the cyber criminals and also to stop cybercrime from taking place by devising appropriate security measures. Furthermore, it is also observed that for identifying and punishing cybercrime offenders, government of the United States (US) has enacted certain laws which include “Communications Assistance for Law Enforcement Act” (CALEA), Computer Software Privacy and Control Act, Digital Millennium Copyright Act and Electronic Communications Privacy Act among others (Global Legal Resources, 2012). With due consideration to the aspect, the paper intends to state about the motivation of the actors i.e. cyber criminals along with the role of cyber security to prevent cybercrime. Additionally, there are certain pertinent methods that have been suggested in order to prevent individuals and organizations’ from facing cyber attacks. Motivation of the Actors Generally, hacking is a culture adopted by the hackers in order to break the secret information which is stored by organizations to support its operations. Secrecy is the root cause of hacking. Additionally, the aspect of hacker culture represents the relationship between the hackers and modern society which discloses cultural attitudes about the relationship between the people along with technology (Thomas, 2003). Along with this motivational factor, there are also two factors which include intrinsic and extrinsic motivation further which also motivate hackers to take certain criminal steps. Furthermore, intrinsic motivation can be defined as the type of motivation in which an individual performs for enjoyment or interest rather than for gaining rewards (Woo, 2003). In relation to this aspect, it can be stated that hackers at times hack others’ systems in order to pass their time and to enjoy the situation while hacking. Generally, this influence arises from own-self than that of external influences. Moreover, extrinsic motivation can be defined as the external influences which help to meet the self-esteem. This motivation is devolved by individuals intentionally in order to win certain rewards such as status, name and money among others (Woo, 2003). It can be observed that for making money, name and status, external motivation can influence hackers to commit such offences that are punishable by law by utilizing their skills in wrong direction. This is because hackers compete with their peers and rivals to earn more money and name. Contextually, it can be stated that the motivation of hackers/actors differ from situation to situation. There are certain factors which motivate hackers to hack others computer which include monetary gain, intellectual challenges, self-expression and peer recognition along with mischief among others. Monetary gain is one of the major causes which motivate cyber criminals to hack accounts prevailing in the banks. It is recognized that at times when an individual is paid lesser amount in accordance with his/her efforts, this situation can influence him/her to hack the bank account and transfer certain substantial amount of money to personal or hidden account. For instance, in August 1994, Vladimir Levin who was a computer programmer in Russia stole and transferred a huge sum of money from the account of Citibank. This is because he was paid lesser salary at his workplace i.e. St Petersburg’s Technological Institute (McGraw Hill, 2000). Intellectual property challenges also influence hackers to hack the technologies in order to access important information for their own use or to sale the information to the individuals who seek for it. This step is taken by individuals to access important information and to provide it terrorist groups in order to earn money. Furthermore, it is also observed that intellectual property challenges influence hackers to develop certain virus programs in order to stop organizations operate their systems. For instance, Simon Vallor, a virus writer from Wales introduced Admirer, Gokar along with ResediB viruses to hack secure profile sites and also to measure his capability to carry out such activities (Australian Institute of Criminology, 2005). Role of Cyber Security Cyber security can be defined as the measure considered by the organizations in order to protect their systems related resources and contained files such as stored information, software and hardware along with internet facilities among others from unauthorized users such as hackers. Thus, from this aspect it is assumed that the primary role of cyber security is to protect the organizational and personal computer systems from unknown users for protecting the important information and documents (International Telecommunication Union, 2005). In order to protect or control cybercrime within nations, the governments should take certain measures to enhance cyber security. Furthermore, the measures can be recognized as policy-making, legal measures, organizational structure and capacity building along with cooperation in between public-private sector as well as industry regulation. Moreover, policy-making can be stated as the measures taken by the government in order to facilitate nations with awareness programs related to the prevailing and upcoming cyber threats. While framing the measures or strategies for cyber security, governments should include certain aspects which comprise: highlighting the significance of Information Communication Technologies (ICTs) recognizing and calculating the probable threats introducing innovative actions in order to protect nations’ effectively, and allocating certain responsibilities to every sector and stakeholder to fight against cybercrime by creating awareness about possible preventive measures Source: (Lebanon, 2009). Legal measures can be stated as the step taken by the government for reviewing the terms and conditions prevailing within the cyber security structure. Furthermore, it also helps to introduce new innovative or effective ideas with present regulations along with updating the related criminal laws. Moreover, organizational structure can be stated as the systematic structure which every organization should consider while formulating their operation. This is because it will help the government to understand the organizational performance along with identifying the threats which the organization can face while carrying out their function. Capacity building can be stated as the area which helps the governments to make organizations aware of cyber security in order to protect from various threats arising from technologies. Cooperation between public-private sectors can be stated as the relation or bonding which is created in between private and government sectors. Additionally, this relation helps both government and corporate sectors to take certain measures or develop polices by working together in order to stop cybercrime by enhancing the process along with improving the measures of cyber security (Lebanon, 2009). In order to stop hackers from hacking computer system, stakeholders or individuals should cooperate with government for enhancing or improving the cyber security measures. A significant cooperation from individuals which should be carried forward includes the considered steps taken by the individuals in relation to the safety measures which prevail during the cyber security awareness programs. Furthermore, individuals should also share information related to the cyber problems and threats they are facing while operating systems through internet to the government or the official in-charge for cyber security (Lebanon, 2009). In meeting with these strategies governments and individuals should consider certain measures in order to enhance the cyber security plans. The considered measures can be recognized as building up of privacy policy, securing the data gathered from online sources, formulating various steps of security and proper planning for storing the data among others. With the help of these measures, governments and individuals could work out policies efficiently in order to stop hackers for hacking (Federal Communications Commission, 2011). Suggested Methods to Stop Cybercrime In order to stop cybercrime every nation is taking various serious measures by investing funds upon cyber security measures along with implementing and reframing the law related to cybercrime. In recent times, certain measures can be observed to be taken by the US government in order to prevent a Chinese company ZTE Corp from conducting business with US companies due to its links with Chinese intelligence activities. Furthermore, the United Kingdom government also asked its corporate sector to take strict initiatives to stop cybercrime which includes enhancing security measures (Business Spectator Pty Ltd., 2012). In relation to these measures taken by the government, certain other initiatives can be recommended to governments and organizations for formulating effective cyber security plans. Governments should encourage organizations to make use of security features such as firewall, process of safe surfing on the internet, secure wireless network and make use of strong security software in order to indentify the problems or vulnerabilities of the present security system. With this procedure corporate and government sector can protect their important information along with maintaining a secure process. Furthermore, it can also be stated that for effective cyber security, governments should encourage individuals to change their user passwords in emails or instant messengers frequently with long and typical variables. There should be a regular survey on the entire system and internet sources which will help users to identify the vulnerabilities in the system which are utilized by cyber criminals to hack the system. Government should take initiative to conduct awareness programs which would in turn help the organizations to devise their own security measures for serving information related to cyber security and causes of cybercrime which can help individuals to be aware of the situation. Along with these measures, government should introduce subject related to cyber security in schools and colleges (Dell, n.d.). Conclusion In recent years, cybercrime has become a critical threat which has been affecting organizations and individuals in different nations. Cybercrime can bring about certain physical or mental harms to individuals or organizations by means of financial loss or theft of important information among others. In relation to this aspect, it has been observed that governments’ in different nations are taking certain measures for developing an effective cyber security process. This is because it will help the nations to de-motivate or prevent hackers from conducting malicious activities. It is recognized that hackers are motivated by certain situations which lead them to hack or access others’ system in order to steal or retrieve information or process. The situations can be identified as intrinsic and extrinsic motivation, money and intellectual property challenges among others. Moreover, for preventing cybercrime governments of different nations have taken certain measures in order to develop cyber security. This is because with the assistance of cyber security, cybercrime can be prevented. The considered measures that have been identified are policy-making, legal measures, organizational structure as well as capacity building along with cooperation between public-private sector as well as industry regulation. In order to reduce hacking through the initiatives considered by the governments, it is observed that governments and individuals both are cooperating with each other for meeting the objective. Contextually, to stop hackers from hacking certain measures have been suggested which can prevent hackers to hack the system such as regular survey, frequent changing of password and conducting awareness program. References Australian Institute of Criminology. (2005). Hacking motives. Retrieved from http://www.aic.gov.au/documents/1/B/A/%7B1BA0F612-613A-494D-B6C5-06938FE8BB53%7Dhtcb006.pdf Business Spectator Pty Ltd. (2012). US cyber security concerns push ZTE to sell off surveillance arm. Retrieved from http://www.technologyspectator.com.au/us-cyber-security-concerns-push-zte-sell-surveillance-arm Dell. (n.d.). Top 10 steps to help stop cybercrime. Retrieved from http://www.dell.com/downloads/ca/support/top_10_steps_to_protect_against_cybercrime_dell_en.pdf Federal Communications Commission. (2011). Cyber security planning guide. Retrieved from http://transition.fcc.gov/cyber/cyberplanner.pdf Global Legal Resources. (2012). Computer crime law. Retrieved from http://www.hg.org/computer-crime.html International Telecommunication Union. (2009). Understanding cybercrime: a guide for developing countries. Retrieved from http://www.itu.int/ITU-D/cyb/cybersecurity/docs/itu-understanding-cybercrime-guide.pdf International Telecommunication Union. (2005). A comparative analysis of cybersecurity initiatives worldwide. Retrieved from http://www.itu.int/osg/spu/cybersecurity/docs/Background_Paper_Comparative_Analysis_Cybersecurity_Initiatives_Worldwide.pdf Lebanon, B. (2009). 9th ITU global symposium for regulators. Retrieved from http://www.itu.int/ITU-D/treg/Events/Seminars/GSR/GSR09/doc/GSR-background-paper-on-cybersecurity-2009.pdf McGraw Hill. (2000). Understanding hackers and how they attack. Retrieved from http://books.mcgraw-hill.com/downloads/products/0072133686/0072133686_ch01.pdf Thomas, D. (2003). Hacker Culture. Technology and Culture 44(1), pp. 194-196. Woo, H. J. (2003). The hacker mentality: exploring the relationship between psychological variables and hacking activities. Retrieved from http://athenaeum.libs.uga.edu/bitstream/handle/10724/6624/woo_hyung-jin_200305_phd.pdf?sequence=1 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 words”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 words. Retrieved from https://studentshare.org/information-technology/1459729-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 Words)
Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 Words. https://studentshare.org/information-technology/1459729-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 1750 Words”, n.d. https://studentshare.org/information-technology/1459729-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Role of Cyber Security in Controlling the National Threat of Cybercrime

Managing information risk and security

The most modern form of cybercrime is identity theft where criminals use personal information from other users, including pictures.... IT-based corporation has also made it as standard policy to restrict employees from breaching organizational rules and requirements in the use of information systems and security policy (ISSP) to ascertain that their behaviours are also aligned on the need to secure company's database.... This paper will qualitatively discuss the importance of managing information risk and security using peer-reviewed journals and books from online sources....
17 Pages (4250 words) Essay

UK, USA and UAE Cybercrime Law

Because of this, it becomes clear that the concept of cybercrime and laws on cybercrime are state-specific.... The state-specific nature of cybercrime in turn brings about an aspect of variance and makes it possible to identify the pros and cons and strengths and weaknesses of these cybercrime laws, as shall be seen forthwith, in the cases of the US and the UK.... ence, the need to initiate a nation-wide act to counter the cyber crime, either on the national and cross-border levels,arises....
4 Pages (1000 words) Essay

Cyber Attacks on America

A report on cybercrime documented recently by Hewlett-Packard indicates that the number of cyber-attacks have risen by 42% as compared to the year 2012 (Lau & Xia, 2013).... ypes of cyber AttacksCyber-attacks could occur in different ways.... Furthermore, it was indicated that security breaches by an organization could cost it up to 1% of its market value.... The review "cyber Attacks on America" observes America's vulnerability to cyber-attacks has increased leading to loss of confidentiality, integrity, and availability....
10 Pages (2500 words) Literature review

Resolving Issues Related to Cybercrime

Authentication mechanisms are also instrumental in preventing various forms of cybercrime.... onsumers and businessmen have continued to face the problem of cybercrime as the legitimate uses of the internet have become more sophisticated and diversified.... This paper has articulated various forms of cyber crimes and the countries in which the crimes have been undertaken.... Furthermore, law agencies have not formulated comprehensive mechanisms of addressing the issue of cyber crimes and the traditional type of policing that exists in many countries is incapable of apprehending the cybercriminals (Ionescu, Mirea and Blajan p....
10 Pages (2500 words) Research Paper

The Progress of the Department of Homeland Security

Working on a strategy of sharing information by various federal, state, and local-level agencies after the 9/11 threat, it needed to create a “trusted partnership” among them to make information exchange integrated, interlinked, efficient and automatic to guarantee national security.... The massive transformation of the DHS is the biggest restructuring of the government since the late 1940s when the CIA, Defense Department, and national Security Council were formed (Kahn, 2009)....
9 Pages (2250 words) Assignment

The US Department of Homeland Security

On 12th February 2013, Obama passed an order to enhance the critical infrastructure of cyber security in the US.... According to Obama, the role of cyber security and the Department of Homeland Security (DHS) is to improve the infrastructure of the framework of cyber security by transferring the required information related to the protection of cyber threats and following proper guidelines as well as rules (Waltzman, Giancarlo and Webb 1-4).... The Criticalness of cyber security and DHSs National Role W/Obama Quote....
9 Pages (2250 words) Research Paper

Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting

Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011).... This paper shall carry out a literature review of cybercrimes, cyber security awareness, including cyber incident reporting.... Related details shall refer to the usual cybercrimes which have gained notoriety and in general, government actions related to cybercrimes, and the challenges presented by cybercrimes and cyber security....
28 Pages (7000 words) Literature review

Criminal Justice System in England and Wales

The insufficient regulation of social networking sites has led to more cases of cybercrime in the UK.... With Face book and Twitter being the most popular social networking sites in the UK, cybercrime is on the increase.... This essay seeks to examine how the rational choice theory can help the justice system in England and Wales against cybercrime.... This helps in understanding how the criminal thinks and come up with ways in how to assimilate the criminal while controlling crime....
17 Pages (4250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us