Cybercrime and Combating Methods

Introduction

The processing of confidential data is essential for most companies operating today. General personal information may include employee records and customer profiles filled with personally identifiable information, financial data files such as invoices and agreements with company payment details, as well as those belonging to customers and suppliers, and business contracts with other businesses (Grimes, 2020). If the storage of this data is not secure, this can lead to a severe data leak. The long-term consequences can be devastating, along with the financial costs of dealing with a data leak containing confidential information. They can lead to a drop in stocks and the closure of businesses.

Secure Storage of Information

The first step to ensuring the security of confidential information that the company works with is creating data protection protocols. Most information security policies are based on the rule of least privilege. The company’s staff and employees from outside have access only to the data they need (Grimes, 2020). As a result, the workflow is never affected, but a premium level of security is maintained.

Protecting specific locations in systems, servers, and the cloud to store sensitive information can be inflexible for companies but also inefficient once data needs to be moved. When dealing with sensitive data, companies should use encryption software instead (Prasad & Rohokale, 2020). Encryption effectively encrypts electronic information, making it look like random characters (Grimes, 2020). Only persons to whom the corresponding key has been issued can view or interact with the content. By protecting data, rather than the storage area, files can move freely through internal systems or be shared outside the protective boundaries set by IT teams while they never become vulnerable.

Preventing The Theft of Information

Attackers can access company data in several ways, including a phishing method that uses unsuspecting employees as a gateway. However, there are also several ways for companies to protect themselves and their dice from such attacks (Alabdan, 2020). The primary and straightforward method that many companies neglect is to update the software. Software and technology companies always add security protocols to their products, but they will not work if applications and devices are updated (Prasad & Rohokale, 2020). The main thing is to be aware of these changes and update the entire set of tools to protect data from hackers.

Companies that want to protect themselves against phishing attacks and hackers can use the anti-phishing toolbar. The phishing protection toolbar is a web browser extension that protects against such attacks when visiting a malicious website. Anti-phishing toolbars check everything clicked on in real time and block any possible threat or attack (Grimes, 2020). They benefit people who do not understand cybersecurity and want to protect their information and data regardless of which site they visit.

Cyberterrorist Attacks

As already mentioned, hackers can use phishing to get the information they need. They are trying to obtain confidential information, such as passwords, usernames, and credit card details, by masquerading as trusted persons using mass email distribution that tries to bypass spam filters (Alabdan, 2020). Emails from popular social networks, banks, auctions, or IT administrators are usually used to attract an unsuspecting public. This is a form of criminally fraudulent social engineering. There is also the concept of targeted phishing – a minor targeted email attack on a specific person or organization to hack their protection (Alabdan, 2020). A targeted phishing attack is carried out after investigating the target and has a personalized component designed to force the target to do something contrary to their interests.

EMP

People are increasingly vulnerable to natural disasters and military attacks on energy systems. Electromagnetic magnetic pulses (EMP) can destroy electronics, leaving the environment untouched but without simple means of survival (Lim et al., 2021). While a massive solar coronal mass ejection (CME) could shut down a significant portion of the world’s electrical grid, electronic devices not connected to the grid will not be damaged. Nevertheless, the electromagnetic pulse emitted by a nuclear explosion is very different because the first of its three phases occurs within billionths of a second. This extremely fast EMP can travel hundreds of miles from an exploding nuclear bomb with a voltage potential of 50,000 volts or more per meter (Lim et al., 2021). This is more than enough to damage unshielded semiconductor electronic equipment permanently.

Protection from EMP

Electromagnetic shielding prevents electromagnetic waves from affecting sensitive electronics — everything from televisions and microwave ovens to mobile phones and baby monitors, as well as critical computer processors in modern smart devices. Painting the screen provides complete coverage at a much lower cost (Lim et al., 2021). In addition, the conductive paint can also remove heat from sensitive electronic devices, allowing them to regulate their temperature and preventing the thermal shutdown of modern electronics. It turns out that a very effective measure of protection against EMP, or shielding, can be made from aluminum foil. Ordinary heavy-duty aluminum foil has blocked all nine million watts of radio frequency energy from entering the radios.

Conclusion

Since threats to data security are constantly changing and evolving, any time spent waiting or delaying a data protection plan implementation or improvement poses a significant risk. These attacks highlight the vulnerability of data and the lack of reliable security strategies in organizations of any size. It is necessary to adhere to the following steps to improve the overall security of the company: knowing what needs to be protected; a firm password policy; a disaster preparedness plan; encryption of confidential information.

References

Alabdan, R. (2020). . Future Internet, 12(10), 168. Web.

Grimes, R. A. (2020). Hacking Multifactor Authentication. John Wiley & Sons.

Lim, C., Min, K., Kim, K., & Park, Y. J. (2021). . Sustainability, 13(2), 570. Web.

Prasad, R., & Rohokale, V. (2020). . Cyber Security: The Lifeline of Information and Communication Technology, 231-247. Web.

Cybercrime: Criminal Threats From Cyberspace

Introduction

  • The internet has provided people with a cheap and easy way of communicating.
  • However, internet has been associated with complex crimes which have posed a big challenge to law enforcement officials all over the world.
  • These crimes range from identity theft, internet scams, cyber stalking, online gambling, pirating, illegal trade, cyber terrorism and fraudulent transactions among others.
  • Cyber criminals invade privacy, destroy brands, harm others and even destroy public trust.

The internet has provided people with a cheap and easy way of communicating. People can access a lot of information, entertainment and is a good avenue for socioeconomic and political activities. However, the internet has been associated with the complex crimes, which have posed a big challenge to law enforcement officials all over the world. These crimes range from identity theft, internet scams, cyber stalking, online gambling, pirating, illegal trade, cyber terrorism and fraudulent transactions among others. While some people engage in these activities as harmless fun and adventure, others are criminals who are determined to use the internet for their own selfish gains. In this case, they invade privacy, destroy brands, harm others and even destroy public trust. From the year 2000, the number of the reported cases has been increasing. However, there are still other cases that have gone unreported since victims have fear that they may be exposed to vulnerabilities.

Introduction

Internet Crimes

Internet Crime Evolution

  • When computers were new, very few people were conversant with them, and their use was limited to a few organizations which could afford them
  • Cyber crime began with unsatisfied employees who caused physical damage to computers
  • Initially, criminals focused their efforts on home users through spreading viruses, identity theft, and cyber stalking
  • The internet has come with many opportunities for internet crimes (Reyes, 2007).

When computers were new, very few people were conversant with them, and their use was limited to a few organizations which could afford them. Initially, the internet presence was experienced by few people hence few cases of computer crimes. Cyber crime began with unsatisfied employees who caused physical damage to computers to get back at their employers in the early 1980s. It has since grown with the increasing popularity of personal computers in homes and the availability of the internet. Initially, criminals focused their efforts on home users through spreading viruses, identity theft, and cyber stalking. With the increasing technology, organizations are also at risk since criminals are determined to hack information and use it to perform transactions that may result in loss of funds or important information. The introduction of the World Wide Web in the 1990s and the evolution of social networking sites in the 21st century have come with many opportunities for internet crimes. Computer crimes keep advancing due to the fast developments in technology (Reyes, 2007).

Internet Crimes

Cyber criminals use various techniques
Cyber criminals use various techniques. Source: Passeri, 2012.

Common Internet Crimes

Hacking and Viruses

  • Hacking is the most popular form of internet crime.
  • Hackers may overwhelm target sites with a lot of information to slow down the system and crash it
  • Viruses may be used by criminals to erase important data
  • Mostly, internet criminals have threatened e-commerce since their main purpose is to obtain funds illegally.
  • Hackers target banks and other financial institutions(Darlington, 2006).

Hacking is the most popular form of internet crime. In hacking, an individual enters private networks and change information or even prevents the legal user from accessing information. In other cases, hackers may overwhelm target sites with a lot of information to slow down the system and crash it. Viruses used by criminals to erase important data or lock up systems are similar to hacking. They take advantage of the lost data to make false claims. They may also generate new data, which may serve to exhort funds or other resources from their victims. Mostly, internet criminals have threatened e-commerce since their main purpose is to obtain funds illegally. They do so by obtaining security information from organization’s customers and using this information to conduct fraudulent activities. It mostly affects banks and other financial institutions. At times, criminals create illegal sites and use them to sell their own products using well known brands (Darlington, 2006).

Pirating and Illegal Trading

  • Digital technology has facilitated internet criminals to infringe on copyright laws
  • It is closely linked to illegal trading
  • Fraud is also popular
  • Criminals have advanced to packet reading
  • Other forms of fraud exist to swindle innocent victims (Darlington, 2006).
  • Online shopping is also greatly affected (Brenner, 2010).

Digital technology has also made it easy for internet criminals to copy creative products such as films and music. Through the internet, many people can share pirated material at lower fees that do not get to the original composer. It is closely linked to illegal trading in which people use newsgroups, bulletin boards or even newsgroups to commit crimes such as parallel trading or counterfeit of established brands. Fraud is also popular, and criminals have advanced to packet reading. In this case, hackers locate data patterns in credit and debit cards and copy this data to reproduce similar ones. Other forms of fraud exist in which fraudsters introduce extra fees for the services they have signed up for without the knowledge of the service users (Darlington, 2006). Online shopping is also affected in occasions where legal registered sellers offer consumers the wrong products (Brenner, 2010).

Internet Scams and Cyber Stalking

  • Scams are very popular with internet criminals
  • They often require information such as credit card details, bank account details, passwords and social security numbers (Brenner, 2010)
  • Notably, social sites have also facilitated internet crimes
  • This has led to increased Cyber Stalking
  • This has been exploited by rapists and pedophiles
  • Criminals use malicious communications through the internet to cause distress and anxiety (Darlington, 2006).

Scams are very popular with criminals enticing their victims to give confidential information with a promise to get them rich. They often require information such as credit card details, bank account details, passwords and social security numbers. It mostly affects those who have limited knowledge on the internet and its dangers (Brenner, 2010). Similarly, the advent of social sites such as MySpace and Facebook has made it easy for criminals to stalk their victims by learning about their hobbies, professions and daily activities. This is common among rapists and pedophiles who take advantage of the social sites to catch the attention of their victims. The UK has experienced multiple cases in which criminals use malicious communications through the internet to cause distress and anxiety (Darlington, 2006).

Cyber Terrorism

  • Cyber terrorism has become a major threat
  • Cyber terrorists design and send computer based attacks
  • This is meant to destroy target networks, systems, or even stored information
  • These criminals are known to purchase aging computers
  • They use them to crack passwords and gain access to critical data
  • Militaries and governments are the most affected groups (Brenner, 2010).

Cyber terrorism has become a major threat since the internet has made it easy for criminals to advance their social and political objectives. Cyber terrorists design and send computer based attacks to destroy target networks, systems, or even stored information to make those operating the given system helpless. Once they destroy networks, they can invade or access information without being monitored. Through the internet, terrorists can also coerce or intimidate the target organizations and governments by sending anonymous threat messages. These criminals are known to purchase aging computers. They use them to crack passwords or guide them into accessing delicate information for them to install similar programs to ease access. This affects militaries and governments and poses security attacks (Brenner, 2010).

Online Gambling

  • The online gambling industry has provided a variety of services
  • However, this has raised issues on consumer confidence, integrity, security and fairness in the games
  • The criminals cheat on others during gambling activities
  • This form of crime is common in the UK, Canada, and Australia (McMullan & Rege, 2010).

The online gambling industry has provided a variety of services including casino games, poker, blackjack, bingo, and lottery games among others. However, this has raised issues on consumer confidence, integrity, security and fairness in the games. Criminals have taken advantage of technology to cheat on others during gambling activities. For instance, they use computer viruses to see the hands of their opponents during play. A study indicated that 50% of casino players believed that internet providers cheated on them and were dissatisfied with the way their complaints are processed. This form of crime is common in the UK, Canada, and Australia (McMullan & Rege, 2010).

Common Internet Crimes

Pirating and Illegal Trading

Internet Scams and Cyber Stalking

Cyber Terrorism

Online Gambling

Distribution of Targets

Conclusion

  • The internet crimes pose a threat to individuals, organizations and states.
  • They involve people from different geographic areas.
  • Thus, it is hard to catch and punish the criminals.
  • A personal initiative is the best strategy to curb this crime.
  • The criminals have become a nuisance and they keep changing their strategies.
  • They have perfected their game for their own selfish gains, harm others and destroy public trust.

In as much as the internet has provided a platform for social-economic development and cultural integration, internet crimes pose a threat to individuals, organizations and states. They involve people from different geographic areas. Thus, it is hard to catch and punish the criminals. The problem can only be minimized through personal initiatives in which individuals take precaution in the way they share internet resources with others. There is a big probability that this problem will keep on growing due to the efforts put by internet criminals in keeping up with the technology. They use it for their own selfish gains, harm others and destroy public trust.

Conclusion

References

Brenner, S. W. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif: Praeger.

Darlington, R. (2006). Web.

McMullan, J.L. & Rege, A. (2010). Online Crime and Internet Gambling. Journal of Gambling Issues, 24(5), 54-85.

Passeri, P. (2012). 1-15 September 2012 Cyber Attacks Timeline. Web.

Reyes, A. (2007). Cyber crime investigations: Bridging the gaps between security professionals, law enforcement, and prosecutors. Rockland, MA: Syngress Pub.

Target Corporation’s Data Breach and Cybercrime

Cybercrime entails the use of a computer or networking device to endeavor in criminal activities. A data breach is one of the primary cybercrimes that significantly affect consumers and the business under attack. The unlawful acquisition of information from a particular system without permission from the owner causes adverse effects to the organization, for example, loss of trust from consumers and financial losses. In 2013, Target experienced a cybercrime that involved a data breach of Target’s system hence accessing the service database consisting of customers’ personal information.

The data breach at Target caused adverse impacts to almost 70 million customers. The cyber attackers accessed the customer’s contact information, which allowed them to monitor their whereabouts. Target also announced that more than 41 million customers’ payment cards were affected, which captured their verification codes giving access to their finances (McCoy, 2017). Consumers not only lost their finances due to the data breach but also lost their trust in shopping at the retail giant.

Target also faced adverse effects caused by the data breach in 2013. The weakness that was detected in their system, which allowed attackers to maneuver and acquire managerial access to the organization, caused a class-action lawsuit against the company. Regardless of their loss, Target was required to pay up to $10,000 to consumers who provided empirical evidence of their losses caused by the cyberattack (McCoy, 2017). An $18.5 million multistate settlement was also required to be met by the organization while providing monitoring services to the unfortunate consumers affected by the cybercrime (McCoy, 2017). The company was forced to use some of its shares to educate the consumers on cybercrimes.

The data breach experienced at Target expounded my knowledge on the possible cybercrimes that might occur. The case scenario that occurred at Target modified my behavior as a consumer while dealing with credit cards. As a consumer, it is essential to ensure the security measures of an organization before giving out personal information. In case of a suspicious request, it is critical to confirm by contacting the company to countercheck the request. Unfortunately, my mother was situated in cybercrime where she clicked on a spam email that tricked her to provide the password to her email. This cybercrime is known as phishing whereby spam emails are randomly sent to individuals. The phishing campaign enticed her with a shopping voucher, which, in turn, ended up corrupting her emails and illegally accessing her personal information. After her case scenario, we learned various ways to protect ourselves against cybercrimes.

Reference

McCoy, K. (2017). USA Today. Web.

Cybercrime and Cybersecurity as Challenges

In recent years, the computer technology field has evolved and developed gradually and has contributed to the success of many individuals and organizations. Technology has faced numerous challenges as it continues to grow tremendously. The main challenge is cyber-attack, where criminals have been targeting companies and individuals, creating great harm to the vulnerable users of technology. Some of the incidences that support this claim are information theft, malware, ransomware attack, and hacking of servers which has become a significant challenge to technology users in all parts of the world. Cyber security experts have rescued technology users by detecting and protecting computer systems from these attacks.

In 2017 shock befell the globe after learning how helpless the world was after the famous wanna-cry ransomware cyber-attack targeted the Microsoft Windows operating system by encrypting the data of its users. The encrypted ransomware demanded some payments in the form of Bitcoins to decrypt the data, an incident that prompted my venture into a career in technology to help in countering these vices affecting technology. Since all technology forms and systems are vulnerable to cyber-attack and it is not always easy to identify the weak link where the cyber attackers would penetrate, relevant studies such as cyber security would solve this problem.

Computer programming sessions were among the best topics back in my school, which drove my desire for this technology path. Being a recent graduate of Electronic Engineering Technology and Computer Engineering Technology from Norfolk State University, getting a chance to pursue a master’s degree in cyber security at Norfolk State University to develop more skills would be highly appreciated. Cyber security is vital to the current growing digital world because it offers confidentiality and security of personal information and financial credentials.

Crucial topics include big data analytics, cloud computing, digital forensics, cyber-psychology, wireless security, and socio-cyber-security. Cyber security knowledge enables an individual to engage in actual-world practice using recent digital security technologies. Top organizations are willing to spend a lot on cyber security experts who can protect their data from being vulnerable, taking a course in cyber security very relevant and marketable with good job security.

The masters in cyber security will enhance the best ways to secure networks and information systems by intrusion detection and detection of ordinary events. One will also learn the defensive cyber security technologies and techniques used in modern organizations to protect systems data and achieve Knowledge of the maintenance and design of reliable and safe information systems. It will also be possible to identify the human factors that compromise a network and computer security.

This program will also enlighten on the legal, technical, policy, and dimensional aspects of network security, computer systems security, and information security. Principles of network security design and operation and those of computer networks, including security assessments, design fundamentals, and incident response, will be achieved. It will also involve auditing and testing knowledge and the standard penetration testing methodology, Technical aspects of networks, computer and information system security, and the techniques related to authentication, access control auditing, and secure communication. These skills gained from the cyber security course will make one fit in various careers: security architect, Chief information security officer, security assessor, and security manager. Occupations such as Security director, security engineer, and information security consultant also require cybersecurity expertise and will be very important in the future dynamic digital world.

Cybercrime and Its Legal and Practical Management

Introduction

Today, innovative technologies penetrate every sector of the global community’s life, whether it is private life, finances, businesses, health or personal information. In modern society, everything can be encrypted in the form of code, so tangible assets are transformed into numbers in the computer software for convenience, carrying the same value. Johnson (2016) uses a metaphor and suggests that the global community “puts all of it physical eggs in one virtual basket and its dependence on cyber technology is now absolute” (p. 2). With the development of various programmes that significantly simplify the daily activities of the organisations and individuals, the issues of privacy and security became more spread. People around the world have faced cybercrime, which imposes severe threats on businesses and individuals on the international level. The purpose of this paper is to investigate the issue of cybercrime and discuss how legal and practical provisions can manage the emerging problem and eliminate those criminal activities.

Investigating Cybercrimes

Within the last decades, cybercrime has gained various names and associations, including e-crime, digital crime and hi-tech crime. First, it is crucial to understand the definition of cybercrime and its implications. Cybercrime is “a diverse range of illegal and illicit activities that share in common a unique electronic environment (“cyberspace”) in which they take place” (Yar & Steinmetz, 2019, p. 6). Consequently, one can say that the actions of a criminal nature that violate federal and public laws and regulations and occur within the Internet space are referred to as cybercrime.

Cybercrime implicates numerous challenges for the global community and its sectors, including jurisdiction. The scholars suggest five critical characteristics of electronic crimes, which include accessibility, anonymity, scale, portability and transferability and global reach (Gillespie, 2019). Those features imply that the Internet is available in different corners of the world, which means its availability, but, at the same time, increases the target audience of victims. Besides, keeping anonymous status is possible in cyberspace, which imposes additional challenges for the authorities to fight those types of crimes. Easy access to the information storage and its portability, as well as the ability of cybercrime to transcend borders, demonstrate the difficulties that the e-crime can cause (Gillespie, 2019). Therefore, the cybercrime characteristics emphasise the necessity of firm regulations and practices that will reduce the number of attacks via the Internet significantly and will provide useful ways of the electronic data and assets protection.

Growing Problem

It is possible to say that the scope of cybercrime is continuously growing. The Office of National Statistics, based in the UK, stated that, in 2016, there were almost six million cases of e-crime (Epps, 2017). Breaches in information can have drastic effects on the organisations, including financial losses and aggravated image and reputation. The statistics from the Insurance Information Institute revealed that from 2014 to 2018, the number of cybercrime complaints and reported damage has significantly increased (“Facts and Statistics,” 2019). The situation implicates that the need for protection and security measures and regulations is growing in the global community. One of the suggestions is to employ “a system that not only keeps the information secure but is also cost-effective and results in a faster and more seamless authentication process” (Epps, 2017, p. 15). In such a way, the companies that have experienced or have a potential threat of experiencing data breaches should integrate all possible protection tools and practices not to have substantial losses in the future.

Besides the significance of various safeguard strategies within individual business, it is crucial to remember the global reach feature of cybercrime, which implies that the issue of digital crimes requires precise international regulations. Thus, it is essential to investigate the seriousness of transnational cyber-attacks and analyse the existing solutions and propositions. Transnational cybercrime refers to any digital crime that infiltrates the system, creates disorder and compromises the original information through the coding language (Perloff-Giles, 2018). In other words, according to Gottschalk (2019), transnational cyber-attacks involve various activities that violate the laws with the use of information technology. Hence, one can note that the crimes that include the use of the Internet do not consider physical borders and can influence any country. Transnational cybercrimes can be represented in various forms of illegal actions, such as online grooming, financial frauds within corporations, money laundering or content piracy (Gottschalk, 2019). Thus, nations around the world have the same need to protect their society, their assets and reputation.

Issue of Anonymity

The fact that the Internet space can be anonymous and that anyone can become a victim of digital attacks emphasises the value of international law in the emerging issue. According to Urbas (2012), “legal jurisdiction traditionally is based on geographical territory” (p. 8). For instance, criminal’s actions are considered based on the laws in the country of citizenship. In some cases, the unlawful individual is judged on the current laws of the citizenship country and the land of crime commitment. Nevertheless, those strategies are not always practical in the cases of Internet criminal activities. Still, with the growing need for protecting the global society, the legal authorities from different nations started to co-operate and turn to law enforcement collaboration. The first step to address the severe problem of cybercrime across the borders was the creation of the Council of Europe Convention on Cybercrime that became effective in 2004 (Gillespie, 2019). This Convention became the first international instrument that considered the significance of cyberspace dangers.

Main Provisions

As far as this document represents one of the most influential works for the management of cyber-attacks at the international level, it is crucial to look at its main provisions. Keyser (2016), suggests that the Convention on Cybercrime became “a new, powerful, and timely piece of international legislation” (p. 132). The Convention includes the guidelines for the measures that nations should undertake at domestic levels and the suggestions for international collaboration (Gillespie, 2019). Hence, it is possible to claim that the solution for the evolving problems can start at the local level, within the country. It is crucial not just for businesses and public organisations to secure the information but also for the country’s authorities to implement the measures that will protect its citizens. Starting with the integration of protection methods at the local level can have a favourable impact on the overall picture.

Still, not always a robust cyberspace defence system within a specific nation can prevent foreign hackers or other types of digital criminals from intervening. As a result, the Convention on Cybercrime also encourages cooperation among countries. Although many states made various attempts to fight cybercrime, the EU “remains at the forefront” in establishing the proper framework to combat digital criminal activities (Mittal & Sharma, 2017, p. 1372). The Convention seeks to harmonise the existing laws within various nations by offering procedures, related definitions and real-time collection of data (Mittal & Sharma, 2017). Moreover, it endorses collaborative assistance in “handling traffic and stored computer data,” which represent the primary cybercrime targets (Hui, Kim, & Wang, 2017, p. 499). Thus, the Convention’s primary purpose is to initiate the collective work of the laws in different states through the requirements to combat cybercrime.

Another significant point about the Convention on Cybercrime and its efficiency is the fact that since the time it was drafted, the cyberspace went through substantial modifications. This document aims to harmonise domestic laws, while in the global world, some nations do not have specific legislation concerning digital crimes (Mittal & Sharma, 2017). Though there are particular weaknesses of the Convention, scholars point out that introducing international agreements in the future can become a substantial step towards fighting the crimes related to cyberspace (Mittal & Sharma, 2017). Therefore, cybercrime represents a critical issue in the global arena and can touch any country. The Council of Europe Convention represents a substantial effort to determine the existing problems of the Internet space and provide possible solutions to gaps in combating digital offences.

In the global community, cybercrime is a complex phenomenon that requires serious actions and modifications, not only according to the Convention. Without any doubt, the Convention portrays one of the essential measures of eliminating cybercrime, but the issue has to be solved on various levels (Sabillon, Cano, Cavaller Reyes, & Serra Ruiz, 2016). Consequently, scholars state that protective measures should start from personal data security implementation and escalates to societal, organisational, military and international levels (Sabillon et al., 2016). It is crucial to remember that, though cybercrime involves technological advancements, integrating security measures only through technology would not be enough. The integration of various fields besides international cooperation, such as training, culture and awareness, in combination with proper technical improvements, will create new opportunities to confront cybercrime (Sabillon et al., 2016). As a result, the existence of a solid defence will decrease the likelihood of cyberattacks and will contribute to the minimisation of digital crime around the globe.

It is useful to observe the suggestions that the National Cyber Security Centre (NCSC) in the UK has issued. The general concept offers a four-component approach, which includes victims’ protection, deterring the UK-based cyber criminality, tackling international cybercrime groups and the criminal marketplace (Saunders, 2017). One can notice that although those provisions were implemented on the domestic level, they concern transnational activities related to cybercrime. Therefore, it implies that internal policies have an influence on international collaboration and encourage nations to work together.

At this point, it is necessary to look at the statement that cybercrime is a challenge, but it is nothing that existing legal and practical provisions cannot handle. It is possible to say that the authorities and law enforcement figures in different nations aim to fight cybercrime, and the continuous work on the current situation improvement is taking place. Still, it is controversial to say that the existing practices have all the necessary means in tackling digital attacks. For instance, in the statistics from the Insurance Information Institute, one can see that from 2015 to 2018, the number of identity thefts did not drop significantly (“Facts and Statistics,” 2019). However, one can trace the improvement and notice the unstoppable development process directed towards fighting cyber-attacks. The promotion of such activities at the domestic level, stronger encouragement of agencies to collaborate and the introduction of universal requirements for fighting cybercrime can solve the problem.

However, the investigation of cybercrimes is a complicated process that has numerous challenges that might prevent agencies and authorities from achieving the desired objectives. Maras (2019) lists the issues that include the lack of or inadequate national and international laws, slow information and evidence sharing networks and deficit in national capacities. Hence, those barriers might slow down the successful cybercrime investigation conducted collaboratively. Still, great work is done to overcome those obstacles and prosper in the cybercrime fight. For instance, Interpol has established a National Central Bureau in all countries that serve the role of the “contact point for law enforcement” (Maras, 2019, p. 284). Consequently, despite numerous challenges, the legislature makes attempts to improve the situation.

Conclusion

The paper has discovered the features of cybercrime that implicate severe challenges, including the burdens on legislation. The problem is that cyber-attacks are connected to technological progress, while jurisdiction is developing at slower rates. Day and Bryant (2014) claim that many insist that “more laws are required to protect individuals, e-commerce, and society” (p. 83). Nations possess diverse jurisdiction procedures concerning cybercrime management and solution. Apart from being a useful tool in eliminating the issue, these regulations can have inadvertent effects on the private lives of individuals or confidentiality. Without any doubt, the increased attention towards the problem of cybercrime will tackle those issues. A powerful transnational collaboration, including individual countries’ approaches that naturally involve international groups’ tracking and law enforcement, will continue finding solutions for the growing problem of cybercrime.

In conclusion, cybercrime and its implications impose severe challenges on the global community. Investigations related to the crimes committed in cyberspace have a complex nature and require strict guidelines. Today, the Europe Council Convention on Cybercrime is one of the most potent international instruments in combating digital criminal activities. Despite the burdens and continuous debates over the effectiveness of the existing laws and regulation, new developments and strategies are integrated into the system, aiming to manage cybercrime efficiently and minimise losses.

References

Day, E., & Bryant, R. (2014). Law and digital crime. In R. Bryant & S. Bryant (Eds.), Policing digital crime (pp. 83–110). Farnham, England: Ashgate Publishing Limited.

Epps, C. (2017). Best practices to deal with top cybercrime activities. Computer Fraud & Security, 2017(4), 13-15.

(2019). Web.

Gillespie, A. A. (2019). Cybercrime: Key issues and debates (2nd ed.). Abingdon, England: Routledge.

Gottschalk, P. (2019). Transnational cybercrime and cybercrime by transnational organisations. In V. Mitsilegas, S. Hufnagel, A. Moiseienko, S. Yanan, & L. Mingxiang (Eds.), Transnational crime: European and Chinese perspectives (pp. 86–100). New York, NY: Routledge.

Hui, K. L., Kim, S. H., & Wang, Q. H. (2017). Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. MIS Quarterly, 41(2), 497-523.

Johnson, M. (2016). Cybercrime, security, and digital intelligence. New York, NY: Routledge.

Keyser, M. (2016). The Council of Europe Convention on Cybercrime. In I. Carr (Ed.), Computer crime (pp. 131–170). New York, NY: Routledge.

Maras, M. H. (2019). Cybercrime laws and investigations. In M. Natarajan (Ed.), International and transnational crime and justice (2nd ed., pp. 281–286). Cambridge, England: Cambridge University Press.

Mittal, S., & Sharma, P. (2017). A review of international legal framework to combat cybercrime. International Journal of Advanced Research in Computer Science, 8(5), 1372-1374.

Perloff-Giles, A. (2018). Transnational cyber offenses: Overcoming jurisdictional challenges. Yale Journal International, 43(1), 191-227.

Sabillon, R., Cano, J., Cavaller Reyes, V., & Serra Ruiz, J. (2016). Cybercrime and cybercriminals: A comprehensive study. International Journal of Computer Networks and Communications Security, 4(6), 165-176.

Saunders, J. (2017). Tackling cybercrime–The UK response. Journal of Cyber Policy, 2(1), 4-15.

Urbas, G. (2012). Cybercrime, jurisdiction, and extradition: The extended reach of cross-border law enforcement’. International Journal of Internet Law, 16(1), 7-17.

Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). Los Angeles, CA: SAGE.

Cybercrime Effects on UAE Educational Institutions

Research problem

Cybercrime is a growing concern in the contemporary world. Because of the high pace of digitalization, there are numerous loopholes and vulnerabilities in systems used by attackers and malefactors. This sort of illegal activity is called cybercrime and acquires the top priority today for project managers responsible for the functioning of a certain organization, the achievement of goals, and further development (Diffee and Datta, 2018). For educational institutions of UAE, the problem is also topical as the frequency of cyber-attacks grows because of the shift of priorities towards online education. However, there is still a little understanding of the scope of the issue in the UAE, and the effects cybercrime has on teachers or educators (Matsumoto, 2019). Additionally, there are no clear guidelines on how to act under new conditions and remain capable of preserving the high efficiency of educational establishments in the UAE (Imranuddin, 2017). Finally, there is no clear vision of the effective cybersecurity model that can be employed by teachers working in the sector, which means that they remain helpless (Philip and Salimath, 2018). For this reason, the research problem is the gap in knowledge about cybercrime in educational institutions of the UAE and the need for improved security measures to resist a new threat.

Research questions

The scope of the theme preconditions the introduction of the following research questions:

  1. What are the effects of cybercrime on teachers and changes in their functioning preconditioned by the growing importance of this concern in the context of UAE?
  2. What guidelines and cybercrime model can be adopted by project managers to address and minimize the effects of cybercrime in the UAE educational institutions?

The given research questions are linked to the objectives formulated above and help to acquire information needed to examine the role of cybercrime in contemporary society. Additionally, the presented research questions will guide the research project and ensure that all important pieces of evidence will be collected and processed appropriately.

Research Aim

The research aims to examine the effects of cybercrime in the UAE educational institutions. The research will propose guidelines that can be adopted by project managers to minimize the effects of cybercrime in the UAE educational institutions. Moreover, the study will propose a comprehensive cybersecurity model that can be used to mitigate cybercrime attacks in the UAE educational establishments.

Research objectives

  • Review the literature to outline the negative effects of cybercrime on the educational establishments and teachers;
  • Ascertain how malefactors can use existing vulnerabilities and loopholes to steal data or damage teaching faculty in the educational institutions of the UAE;
  • Establish the effects of cybercrime on teachers and changes in their functioning preconditioned by the growing importance of this concern in the context of educational establishments in the UAE;
  • Propose a cybersecurity model that will be include cybercrime guidelines and key determinants that can be used by UAE educational sector to manage and mitigate cyberattacks

Research Statement

The diversity in the negative effects of cybercrime on project managers presupposes the need for a specific response to manage the problem. The poor understanding of the problem and the absence of tools available to project managers precondition the deterioration of the situation (Matsumoto, 2019). Under these conditions, the creation and implementation of specific guidelines, along with the comprehensive cybersecurity model can reduce cybercrime rates in educational establishments of the UAE. Managers will acquire strong tools and strategies to respond to the growing diversity of threats.

Depended variable

The dependent variable in the research is the cybercrime rates in the educational establishments of the UAE. As far as there is a need for an in-depth investigation of how different models work, it is vital to measure any changes in the state of cybercrime and its rate to conclude about the effectiveness of a particular measure.

Independent variables

The guidelines offered to project managers outlining the safe behaviors and practices and the comprehensive cybersecurity model are the independent variables of the study. It is critical to determine the effectiveness of these measures in struggling against cybercrime and resisting threats associated with this factor. For this reason, such factors are viewed as independent variables, and their influence should be measured.

Research hypothesis

The negative effects of cybercrime on the teaching faculty in the educational institutions of the UAE can be managed by using specific guidelines and cybercrime model.

Novelty of the study

The project has both practical and theoretical novelty. First of all, there is an attempt to create relevant and effective interventions that would help to alter the situation in the education domain of the UAE and provide managers with tools that are needed to resist cybercrime. The establishment of the comprehensive model can be viewed as a novel approach for the sector as it considers all existing problems and their diversity, which increases every year.

At the same time, the theoretical novelty of the research comes from several factors. Initially, there is an attempt to analyze the problem of cybercrime that effects the educational scope of the UAE. Previous attempts were focused on the analysis of the area in general and universal ways to resist it. However, their effectiveness might vary because of the accuracies of the working environment its diversities. For this reason, the focus on the scope of education with its own characteristics is vital for the creation of an improved vision of the problem and generation of the enhanced capability to resist it. Altogether, the high practical and theoretical novelty of the research justifies the choice of the topic and proves the need for further research in the given scope.

Operational definitions

Variable Theoretical definition Operational definition Measurement
items/scales
Dependent variable Cybercrime is an illegal and criminal activity presupposing using a computer, networks, or devices that have access to networks, to cause damage and perform maleficent actions, cause damage, and deteriorate the functioning of an organization (Diffee and Datta, 2018). The dependent variable can be measured by evaluating its current rates, the number of cyberattacks, their nature, and damage caused by them to educational establishments in the UAE. The frequency of attacks per a selected period will be measured to outline the average meaning.
Independent variable (1) Guidelines on cybersecurity and resisting cybercrime are a set of rules and recommendations offered to managers to minimize the risk of being attacked or hacked (Diffee and Datta, 2018). Guidelines’ acceptance by teachers can indicate its applicability to the UAE educational sector Surveys can be used to collect information about teachers’ acceptance and readiness to use guidelines.
Independent variable (2) Comprehensive cybersecurity model is a framework characterized by the minimum vulnerabilities achieved by following the guidelines and using innovative security systems (Philip and Salimath, 2018). The functioning and effects of cybersecurity models can be evaluated by monitoring the dynamics of attacks stability of institutions’ functioning The variable can be measured by determining if there is a reduction in the number of cyberattacks. teaching faculty responses can also be evaluated.

Conceptual framework

For the research, an existing framework offered by previous research paper is being used. The given model states that cybersecurity is a complex concept consisting of multiple factors. To attain success, it is vital to consider legal, technical, organizational measures, capacity building, and cooperation (ABI Research, n.d.). Building the model for the research, the technical and organizational measures are considered as they can be impacted by the proposed variables. Guidelines on cybersecurity and cybersecurity model affect the organizational elements of a unity and its technological components:

Technological components

Reference List

ABI Research (n.d.) Global cybersecurity index. Conceptual framework. Web.

Dasgupta, D., Akhtar, Z. and Sen, S. (2020) ‘Machine learning in cybersecurity: a comprehensive survey’, The Journal of Defense Modeling and Simulation.

Diffee, E. and Datta, P. (2018) ‘Cybersecurity: the three-headed Janus’, Journal of Information Technology Teaching Cases, 8(2), pp. 161–171.

Imranuddin, M. (2017) A study of cyber laws in the United Arab Emirates. Master Thesis. Rochester Institute of Technology. Web.

Matsumoto, A. (2019) ‘Literature review on education reform in the UAE’, International Journal of Educational Reform, 28(1), pp. 4–23.

Philip, J. and Salimath, M. S. (2018) ‘A value proposition for cyberspace management in organizations’, Business Information Review, 35(3), pp. 122–127.

Zhuang et al. (2015) ‘A theory of cyber attacks. A step towards analyzing MTD systems’, 2nd ACM Workshop on Moving Target Defense, pp. 1-10.

Cybercrime: Researching of Issue

Cybercrime is continuously growing with the expansion of business networks and the internet. Currently, organizations of all sizes rely on their internet connectivity, data, and networks to conduct their businesses. From an international community perspective, cybercrime causes the global economy to incur an annual loss of about $445 billion, with businesses being damaged by intellectual property theft that exceeds a $160 billion loss to individuals (Bandler and Merzon, 2020). The threat keeps growing due to cybercriminals’ intention to exploit the existing network and online vulnerabilities in business networks. Further, businesses’ lack of resources and knowledge contributes to the challenge since one in four business owners has little or no understanding of the threat posed by cybercrime.

The link between national security and cybercrime is becoming an increasingly prevalent challenge from a national perspective. With the advancements in technology, the criminal ability to cause harm and annoyance to a country’s critical infrastructure and the people continues to undermine the dynamic instrumentalities (Schuh, 2019). Similarly, the national security profile of a country has been impacted by an increase in the parallel approaches to physical attacks with which cyber-attacks occur. Modern interconnectedness provides an almost parallel approach that causes uncertainties, offers undermining methods to a nation’s security, and is more damaging than physical attacks.

Cyber-attacks scope on towns and cities is now clearer from the hometown level. More than 70 percent of ransomware attacks in the U.S. are targeted at local and state governments (Muggah and Goodman, 2019). Cybercriminals are deploying distributed service denial attacks, ransomware, and associated off-the-shelf hacker tools that bugle and interrupt municipal networks. The digital arsenals threatening municipal networks are sourced from the deep web with fully automated weapons resulting in continuous attacks on local governments.

References

Bandler, J., & Merzon, A. (2020). Cybercrime investigations: A comprehensive resource for everyone. CRC Press.

Muggah, R., & Goodman, M. (2019). Our cities are under cyberattack. Here’s why – and what they should do about it. World Economic Forum. Web.

Schuh, J. (2019). Cybercrime. O’Reilly.

Technological Advancements in Cybercrime and Fraud

Introduction

Advancements in technology hinder numerous aspects in their essence, possessing both positive and negative influence on the sphere of cyberspace. Various modern developments offer substantial advantages to the authorities and specialised agencies in designing robust strategies and tools directed at combating the issue of cybercrime. However, high computer misuse and fraud rates can be connected to the information technology improvements that serve as a ‘fertile ground’ for the crimes (Chawki, Darwish, Khan, & Tyagi, 2015, p. 4). Consequently, it is critical to investigate the issue of the ongoing expansion of digital platforms and tools and its relation to the emergence of electronic crimes in the UK. Statistical analysis of the data provided by the Office for National Statistics, the assessment of existing literature and designing of surveys with the authorities’ members can provide the foundation for the research.

Aims

  • To investigate the connection between rapid technological development and high rates of cybercrime and fraud in the UK.
  • To investigate the potential influence of technology advancements on the possibility to implement additional and more sophisticated security measures to decrease the level of cybercrime and fraud.

Objectives

  • To conduct a substantial literature review on the topic of cybercrime and fraud rates in the UK.
  • To analyse statistical data provided by the Office for National Statistics and set aside the trends in cybercrime and fraud within the last year.
  • To assess current protection, safety, and security measures undertaken by the authorities in the attempts to combat cybercrime and fraud.
  • To address the reasons behind high rates of cybercrime and fraudulent activities.

Why is This Research Worth Doing?

Technological developments rapidly enter numerous aspects of individuals’ lives and business operations, which creates a substantial ground for the emergence of related crimes. The active integration of information technology offers multiple advantages but, at the same time, hinders potential threats for the safety and trustworthiness of information and individuals. Technological proliferation has shaped the way individuals live and, as of 2013, there were more than 35 million Internet users in the UK (Holt, Bossler, & Seigried-Spellar, 2015). This number implicates the potential target audience for computer abuse. The global expansion of technological integration led “to the digitalisation of sensitive financial and government information,” as well as private data and the creation of massive databases (Holt & Bossler, 2015). In such a way, a foundation with numerous opportunities for both digital misuse growth and the implementation of new security measures exists in the field.

Another significant factor that points out the necessity of this research is the seriousness of potential cybercrime dangers. Digital space offers various possibilities for the commitment of electronic abuses, which highlights the need for “regulatory measures and policing in national strategies” (Lavorgna & Sergi, 2016, p. 171). It implies how severe the incidents can be and how much harm they can bring to society. Thus, cybercrime and fraud represent a critical issue and require careful assessment and the search for new ways to battle the problem.

Previous Work

Modern technology advancements help countries around the globe to enhance their network and communication exchange and utilise new ways of operations and strategies. Simultaneously, the innovations can be considered to be a trigger to the emergence of electronic crimes. According to Chawki et al. (2015), “the growth of global connectivity is inseparably tied to the development of contemporary cybercrime,” which can generate numerous violations within this sphere (p. 3). Moreover, data breaches and fraudulent activities have substantial costs for the victims and authorities. In such a way, e-commerce fraud and card and banking violations’ losses are increasing (Levi, Doig, Gundur, Wall, & Williams, 2015). This fact emphasises the connection between technological progress and the occurrence of distinctive types of computer misuse and fraud. Curiously, the virtual world with passwords and codes as a protection measure does not possess the same borders as the physical one (Viano, 2017). Thus, it increases the chances of criminal pervasion into the private or corporate space.

Moreover, the scholars highlight different opportunities offered by the convenience of various advancements. The British government has doubled spending on cybersecurity in attempts to combat the growing problem (McMurdie, 2016). The high expenditures imply the fact that the technological process facilitates computer misuse and fraud and needs more rigid attention. Besides, the reach of developments led to the growth of “avenues for engaging in criminal behaviour” (Willits & Nowacki, 2016, p. 105). It is possible to state that the improvements in the availability and expansion of services provided by technology have an impact on the increasing numbers of cybercrime.

Another significant aspect to cover is the adoption of advancements to fight electronic crimes and prevent fraudulent activities. In contrast to the fact that technology growth is directly related to criminal cases, different analytical and preventive tools and systems are designed with the help of developments. One of the instruments is the integration of advanced analytics technology that can point out what happened, why such behaviours are occurring and what it is doing to the operations (De Oliveira & Stickings, 2016). Moreover, it is crucial to understand the stages that the investigation and, as a result, the protection process should include. Such phases, as initiation, outcome, cybercrime execution stack, and law enforcement constitute the foundation for the integration of tools and strategies (Sun, Shih, & Hwang, 2015). Hence, incorporating progressive measures can build a defensive mechanism against illegal infiltration and help to manage the threats at different levels.

Thus, it is also essential to go through the policies and actions generated with the help of information technology and used to protect the online space from cybercrime. Digital developments made it possible to access the data using such tools as GPRS and EDGE (Gillespie, 2016). Consequently, it is vital to integrate legislation and specially-designed guarding procedures. The creation of the National Cyber Security Centre, which serves as “the centre of government expertise on cyber,” represents the attempt to respond to the emerging issue and tackle it (Saunders, 2017, p. 5). As a result, the authorities are concentrating their forces and professionals to come up with the most powerful strategies that will provide guidance, advice, and support for the computer misuse and fraud threat. Moreover, particular measures include the implementation of such standards as DMARC and DNS RPZ filtering (Saunders, 2017). Those provisions represent active utilisation of technology advancements aiming to protect the cyberspace from the attacks.

Design and Methods

This research will apply the combination of primary and secondary data as the foundation for the assessment, with the more significant part of work based on secondary sources. It is crucial to obtain the statistics on fraud and cybercrime provided by the Office for National Statistics. This source of information reflects the figures from the Crime Survey for England and Wales and Home Office police recorded crime incidents (Office for National Statistics, 2019). It will be possible to examine this information with the help of SPSS, R, and Microsoft Excel analytical tools. Each of that software can provide useful data and generate its graphical representation. Thus, an analysis of the rates of computer misuse and fraud in different areas and based on distinctive types of online abuse within the nation will be carried.

Besides, the research will undertake an assortment of secondary sources, such as scholarly journal articles and books related to the sphere of cybercrime, security, and legislation. The platforms for collecting the information will be Google Scholar, EBSCO, and JSTOR to ensure the reliability of the used resources. The used keywords will include ‘cybercrime,’ ‘fraud,’ ‘information technology’ and ‘UK.’ Additional search will also use such keys as ‘measures,’ ‘security,’ ‘digital crime’ and ‘criminal law.’ Through the investigation of those resources, in combination with the findings from statistical analysis, it will be possible to meet the study’s aims and objectives.

Another part of the research will implement a collection of primary data if obtaining permission. Generating a survey aimed at questioning national agencies on the strategies that they utilise and on their view on information technology can offer additional information. It is crucial to gain informed consent with the participants of the survey and ensure the protection of anonymity and confidentiality if requested. Linking the findings from the questionnaire to the secondary data can provide a greater picture of cybercrime and fraud, its connection to the modern developments, and the existing and potential safety, security, and protection measures. The use of the mentioned resources implies the exploitation of both qualitative and quantitative research methods. Statistical analysis will generate numerical data, while an investigation of secondary information will deliver descriptive details on the issue. It is crucial to remember research limitations while doing a thorough findings’ assessment.

Ethical Considerations

The research will be undertaken in compliance with the British Society of Criminology’s (BSC) Code of Ethics. It is vital to use it as a foundation because it supports “reflective and responsible ethical practice in criminological research,” which is essential to the study (British Society of Criminology, 2015, p. 2). The primary focus of this work is gathering secondary data available in print or online versions, which implicates that the researchers will be mindful with information protection aspect. Besides, the BSC requires the citation of others’ ideas, regardless of the material’s status, and the check of reliability (British Society of Criminology, 2015). Personal facts will not be disclosed, all the information will be cited appropriately, and the study will employ only reliable sources. It is also critical to establish suitable relationships with the research’s sponsors. Maintaining good connections and seeking to clarify the obligations of those involved in the research is essential (Scott, 2018). Thus, considering all possible implication of the study is critical for compliance with ethical requirements.

The utilisation of primary data emphasises careful understanding of ethical considerations as well. The research should keep in mind that the study aims to eliminate any risk to the surveys’ participants. In such a way, based on the BSC’s Code of Ethics, the study will minimise any physical or psychological harm, or the devaluation of personal worth among the contributors (British Society of Criminology, 2015). Consequently, it is significant to ensure the sensitivity to all the ethical deliberations. A detailed analysis of those can be found in Appendix A. Besides, the research will be conducted objectively and without prejudices, where its discussion and conclusion are based on ethical standards.

Timetable

The research will be conducted on a part-time basis for six months and will include three primary stages.

  1. First and second months:
    • Collecting the information from the Office for National Statistics;
    • Evaluating the statistical data with the help of analytical software;
    • Generating the proper questions for the survey for further distribution among the participants;
    • Ensuring the presence of all the ethical considerations for the collection of primary data.
  2. Third and fourth months:
    • Searching for reliable sources;
    • Determining information that is most suitable to the research topic among the allocated resources;
    • Sending out the surveys to the participants.
  3. Fifth and sixth months:
    • Analysing the findings from the surveys;
    • Compounding the results of the statistical analysis with the outcomes of the secondary data assessment;
    • Combining the discoveries from the primary sources with the information from secondary sources;
    • Outlining the limitations of the study;
    • Linking all the findings together and presenting them in a report form.

Resources & Costs

The greater part of the research will involve gathering the information that is available in print version or via the Internet. The Office for National Statistics provides statistical data at no cost. The utilisation of analytical software is also integrating free programs such as R and Microsoft Excel, and access to SPSS can be obtained with the help of the university. Hence, the collection of secondary data and an assessment of statistics do not imply any costs. Still, it is crucial to consider possible fees to gain access to the paid materials and to hire a specialist in a statistical evaluation for a more precise data evaluation. Thus, miscellaneous costs of £300 will be accounted for this part of the research.

The collection of primary data involves the costs for the design of necessary documents, such as informed consent, which may require a discussion with a lawyer to ensure the credibility and reliability of all aspects. Therefore, the required funding for this part of the study might need around £700 to hire the professionals who will design everything needed without the gaps. Consequently, the overall cost of the research will be £1000.

References

British Society of Criminology. (2015).Web.

Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015). Cybercrime, digital forensics and jurisdiction. Cham, Switzerland: Springer.

De Oliveira, I. S., & Stickings, A. (2016). Financial institutions and cybercrime: Threats, challenges and opportunities. RUSI News brief: Cybercrime, 36(4), 17-19.

Gillespie, A. A. (2016). Cybercrime: Key issues and debates. New York, NY: Routledge.

Holt, T. J., & Bossler, A. M. (2015). Cybercrime in progress: Theory and prevention of technology-enabled offences. New York, NY: Routledge.

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2015). Cybercrime and digital forensics: An introduction. New York, NY: Routledge.

Lavorgna, A., & Sergi, A. (2016). Serious, therefore organised? A critique of the emerging “cyber-organised crime” rhetoric in the United Kingdom. International Journal of Cyber Criminology, 10(2), 170-187.

Levi, M., Doig, A., Gundur, R., Wall, D., & Williams, M. (2015). Web.

McMurdie, C. (2016). The cybercrime landscape and our policing response. Journal of Cyber Policy, 1(1), 85-93.

Office for National statistics. (2019). Crime in England and Wales: Additional tables on fraud and cybercrime. Web.

Saunders, J. (2017). Tackling cybercrime–the UK response. Journal of Cyber Policy, 2(1), 4-15.

Scott, D. (2018). The politics and ethics of criminological research. In P. Davies & P. Francies (Eds.), Doing criminological research (pp. 137-160). London, UK: SAGE.

Sun, J. R., Shih, M. L., & Hwang, M. S. (2015). A Survey of digital evidences forensic and cybercrime investigation procedure. IJ Network Security, 17(5), 497-509.

Viano, E. C. (2017). Cybercrime: Definition, typology and criminalisation. In E. C. Viano (Ed.), Cybercrime, organised crime, and societal responses: International Approaches (pp. 3-22). Cham, Switzerland: Springer.

Willits, D., & Nowacki, J. (2016). The use of specialised cybercrime policing units: An organisational analysis. Criminal justice studies, 29(2), 105-124.

Relation Between Cybersecurity and Cybercrime

Introduction

In an era of global digitalization of all aspects of life, cybersecurity is of particular importance. The digital and economic wellbeing of citizens, social stability, and trust on the Internet depend on how well-developed the cyber security framework is. However, cybercrime is not uncommon for today’s users, and the number of various schemes to defraud and extort money through social engineering and computer programs are actively growing. This research paper aims to shed light on the phenomenology of cybersecurity and cybercrime as part of this security breach.

Cybersecurity: Definition

Cybersecurity, while a modern term, still does not have an unambiguous definition that fully encompasses all aspects of the phenomenon. For example, the U.S. National Cyber Security Agency defines the term as the art of protecting networks and devices from unauthorized access to them (CISA, 2021). In this interpretation, the philosophy of privacy of personal, commercial, and strategic data on which cybersecurity is built is clearly visible. Von Solms (2021) shows that cybersecurity applies mainly to the domain of the Internet, only within which the term makes sense. Meanwhile, one should not assume that cybersecurity is the prerogative of technicians and software engineers only since the consequences of a breach will affect the entire business or private life of those not associated with the world of IT technology. Consequently, as Dodson (2018) postulates in his presentation, cybersecurity issues are essential to all people and business industries. Notably, cybersecurity is not stable and is constantly moving toward improving security tools. For example, Geluvaraj et al. (2019) report that integrating artificial intelligence techniques into cybersecurity practices will lead to promising discoveries and a qualitative change in the agenda. Taking all of the above into account, it becomes possible to draw a generalized conclusion about what exactly cybersecurity is. Thus, cybersecurity should be understood as part of the discipline of information security and activities aimed at preventive protection of mobile networks and devices against intentional or unintentional hacking.

Notably, cybersecurity has long-lasting significance for the individual and for business, as its breach can become a critical threat. Thus, it is safe to say that cybersecurity aims to protect private data, money, and reputation from access by people who should not have that access. For example, if large corporations typically have a system for allocating access so that a person with lower levels of access is never authorized to access strategically important company data (Reynolds, 2019). Cybersecurity protections are implemented not only internally but also externally, which protects private data from any hacking and phishing attacks.

Types of Cybersecurity

As with the different definitions, there is no single classification that reflects all the different forms of cybersecurity. However, the following four types of this phenomenon can cover all aspects as broadly as possible. Thus, the first type is network cybersecurity, whose framework is designed to protect computers from external attacks carried out within the network. This includes attacks on email as a result of phishing, where clicking on third-party links drops a virus on the user’s device. In fact, this is the most common type of cybersecurity with which this phenomenon is traditionally associated in general. Network cybersecurity is implemented with many barriers and filters, and one of the primary ones is the firewall, a system utility to control the traffic that passes through.

The second type is cloud-based cybersecurity, which is designed to protect the digital assets of users or companies that are online. One of the most prominent examples where this type of security is most needed is Netflix, which allows cloud streaming of thousands of media titles, essentially the company’s digital assets. Unauthorized access to movies and shows would lead to theft and piracy of what the company gets paid for, so cloud-based cybersecurity proves critical. This includes any files that the average user stores on virtual cloud drives, whether iCloud or Google Drive. Security when using apps is another type of cybersecurity. In this context, responsible developers create mobile platforms and apps that protect the user’s personal data and prevent third-party programs from accessing content. This can be accomplished through built-in security systems and password-protected access to the app, including two-factor authentication.

The three types of cybersecurity discussed earlier were aimed at providing preventive measures against attackers. However, if data has already been compromised, and especially if the data belongs to large organizations, the type of operational cybersecurity is implemented, acting urgently and ex post facto. Operational cybersecurity is needed to minimize the damage from a hacker attack and, if possible, regain access to the data. This includes working to ensure backup plans and creating reinforced encryption of employee data.

Cybercrime: Definition

No matter how much the cybersecurity framework is developed, however, it will never be enough to guarantee one hundred percent protection from hacking. Cybercrime will always exist and evolve because, as Bhatia (2019) said, “without a cyber-attack, the concept of cybersecurity cannot exist” (p. 55). Cybercrime is interpreted in different ways, and among its definitions, one can find that cybercrime is any form of crime that is committed through the use of a computer (Panda Security, 2021). An interesting perspective on cybercrime is found in Collier et al. (2021), who pointed out that the decision to engage in virtual crime often involves a sense of boredom. An important property is highlighted by Sarre et al. (2018), who pointed out that cybercrime remains a serious societal problem requiring urgent action by law enforcement orders. The synthesis of everything described leads to the conclusion that cybercrime is, in general, any crime that is committed in an information technology environment.

In fact, everyone has once faced the manifestations of cybercrime, losing money, some of their data, or information that they do not want to share. Hacks in social networks happen quite often, and quite a few modern users have already been trained in the basics of online behavior so as not to become a victim of fraud. Meanwhile, the number of virtual crimes is proliferating, as is the number of ways in which cybercriminals defraud users. For example, data reports that 93.6% of malware could easily adapt so that built-in security systems do not detect their code (Zaharia, 2021). In addition, it is predicted that by 2023, more than 33 billion accounts, four times the world’s population, will be compromised (Vojinovic, 2019). Consequently, multiple cybersecurity threats continue to be relevant and are unlikely ever completely to disappear; instead, they will continue to improve and adapt continually.

Types of Cybercrimes

Cybercrimes can be roughly divided into two groups: those aimed at devices and those aimed at seizing private data. The first type of threat includes any attack by hackers whose aim is to render a computer device inoperable in order to extort it. The price to pay for unlocking a device can be money or personal data; only after transferring them can the scammers unlock the user’s computer if they want to. This category of cybercrime includes viruses, malware, and DoS attacks (Panda Security, 2021). Interestingly, comparatively recently, this category has been able to add another threat, namely hidden cryptocurrency mining on the user’s computer (Nadeau, 2021). This type of crime may seem harmless to individuals because it does not steal data, but instead, the planted beacon steals the user’s traffic and the computing power of the device in order to covertly mine cryptocurrency. The user notices a dramatic decrease in the functionality of their computer and a constant cooling system, even when the computer is not performing resource-intensive tasks.

The second category of cybercrime includes any programs and actions designed to compromise. Specifically, this includes social engineering, phishing emails, identity theft, and cyberbullying. Such threats are not only aimed at siphoning money from a user or company but may also be aimed at committing physical crimes based on the material received. Cyberbullying is a susceptible sector in this category, as it aims at depressing the mental wellbeing of individuals, which can lead to tragic consequences in real life.

Conclusion

To summarize, cybersecurity is one of the most important feature of today’s Internet-dependent civilization, investing in the protection of virtual personal data. The digitalization of almost all areas of life catalyzes the need to protect this data. However, cybersecurity is not absolute, as there is always the threat of cybercrime. Such virtual crimes have consequences beyond the Web, so cybersecurity is constantly developing new defense techniques.

References

Bhatia, D. (2019). Do you think cybersecurity is a new concept? Think again…. Cybernomics, 1(7), 55-56.

CISA. (2019). Security tip (ST04-001). Department of Homeland Security. Web.

Collier, B., Clayton, R., Hutchings, A., & Thomas, D. (2021). Cybercrime is (often) boring: infrastructure and alienation in a deviant subculture. The British Journal of Criminology, 61(5), 1-9.

Dodson, D. (2018). Cybersecurity: Is it about business or technology? Usenix. Web.

Geluvaraj, B., Satwik, P. M., & Kumar, T. A. (2019). The future of cybersecurity: Major role of artificial intelligence, machine learning, and deep learning in cyberspace. International Conference on Computer Networks and Communication Technologies, 739-747.

Nadeau, M. (2021). Cryptojacking explained: How to prevent, detect, and recover from it. CSO. Web.

Panda Security. (2021). Types of cybercrime. Panda. Web.

Reynolds, M. (2019). How to define access levels in access control systems. DGA. Web.

Sarre, R., Lau, L. Y. C., & Chang, L. Y. (2018). Responding to cybercrime: Current trends. Police Practice and Research, 19(6), 515-518.

Vojinovic, I. (2019). More than 70 cybercrime statistics – Soon to be a $6 trillion problem. Dataprot. Web.

von Solms, B. (2018). Cybersecurity and information security – what goes where? Information & Computer Security, 1-10.

Zaharia, A. (2021). 300+ terrifying cybercrime and cybersecurity statistics (2022 edition). CompariTech. Web.

Modern Cybercrime: Most Recent Threats and Cybersecurity

Introduction

Over the past decades, virtual space has changed the way people live and do daily business. The Internet has changed the way people communicate, and for many businesses and organizations, the way they work has changed. In today’s business environment, if an organization does not have any kind of internet presence, it risks being left behind its competitors as advanced technology continues to evolve.

Cybersecurity Threats

Phishing remains the main method of infiltrating corporate infrastructure, accounting for a large percentage of attacks. Also, there are security threats to IoT devices, deepfakes, malicious ads, cyber attacks from social networks, and many other threats (Narwal et al., 2019). Therefore, the virtual space at the current stage of development is not completely safe.

Most Recent Threats

Artificial Intelligence (AI)

AI adoption can greatly simplify many of the day-to-day tasks faced by cybersecurity teams. Recently, there has been exponential growth in the amount of data processed in various systems (Narwal et al., 2019). There is a growing trend toward the use of artificial intelligence and machine learning technologies by cybercriminals to search for vulnerabilities, implement phishing attacks, bypass biometric authentication and protection, create malicious software, and guess passwords.

Cryptojacking and Cloud Data Leaks

Cryptojacking is a trend in which cybercriminals take over the home or work computers of third parties in order to “mine” cryptocurrency. Mining cryptocurrencies requires massive computing power. Therefore, hackers can make money by copying other people’s systems (Carlin et al., 2019). Additionally, the pandemic has forced organizations to do everything on the basis of the cloud due to its significant advantages, such as full visibility and control over data, cost savings, reliability, mobility, etc. At the same time, even protection does not provide complete security.

Threat Actors

The common categories of threat actors include cyber terrorists, script kiddies, organized cybercriminals, state-sponsored threat agents, inside agents and bad actors, human error, and hacktivists. To build a safe system, an analysis of possible threat actors is used. Phishing is an entry point for them; thereafter, techniques and tactics are used, including continued phishing beaconing, long-term persistence, and reconnaissance (Dobrowolski et al., 2020). These days, they can use remote work, cloud systems, less secure mobile payment systems, social media, and many other unsecured structures to penetrate the virtual space.

APT12 Analysis

One of the cyber groups is a Chinese cyber espionage group known as DynCalc, DNSCALC, XESHE, or simply APT12. The organization has used recognized malware such as phishing emails, HIGHTIDE, THREEBYTE, and WATERSPOUT in its malicious campaigns. Each of this malware became more and more advanced versions, which is difficult to track and control. There was a slight hiatus in the activities of the organization, but now it is active again. Moreover, this group targets organizations in China and Taiwan (Moran & Oppenheim, 2018). The APT12 group successfully achieves its goals, as its attacks and malware are noted in many organizations. Thus, in the modern world, there are organizations that have been presented in the cybercrime market for many years but continue to conduct attacks.

Cybersecurity Tools, Tactics, Procedures

The reliable and secure operation of data transmission networks, computer systems, and mobile devices is an essential condition for the functioning of the state and maintaining the economic stability of society. The safety of key public information systems is influenced by the use of hardware and software, including semiconductor technologies, removable hardware, dark web monitoring, antivirus software, encryption, and penetration testing. All of these technologies can be used in in-depth defense to create multiple layers of security.

Tools Versus APT 12

Today, the Internet is not a particularly safe place. This is due to the fact that the Internet is a public open system in which data moves uncontrollably and can be discovered, intercepted, or stolen if the correct knowledge of the equipment is applied. This state of affairs is troubling, especially when sensitive data such as personal or financial information is transmitted over the Internet.

Machine Learning Against Cybersecurity

Advances in machine learning in recent years have allowed the creation of a huge number of applications such as applied data analysis, threats, malware detection, and removal. This can help the world in the fight against cybersecurity, for example, by quickly analyzing codes and finding errors in them (Handa et al., 2019). The solution to many problems is provided by Darktrace. Each enterprise, offer a personal “immune system” that analyzes the flow of information within the company and looks for various kinds of vulnerabilities. The clients of this company are giants such as eBay, Samsung, and Micron. If machine learning were used in APT12 attacks, it could make it possible to find anomalies in the patterns of user and device behavior and promptly recognize and block the attack. None of the APT12 case studies described indicate that organizations have used machine learning.

Conclusion

In conclusion, the modern world is susceptible to various types of cyberattacks. There are criminal groups that wield power to harm organizations or even states. At the same time, new solutions steadily appear, the application of which can help to deal with virtual crime. Since people these days are very curious about the online space, it is important to make their presence in it beneficial and safe.

References

Carlin, D., Burgess, J., O’Kane, P., & Sezer, S. (2019). IEEE Security & Privacy, 18(2), 16-22. Web.

Dobrowolski, D., Gioe, D. V., & Wanless, A. (2020). The RUSI Journal, 165(3), 22-38. Web.

Handa, A., Sharma, A., & Shukla, S. K. (2019). Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 9(4), e1306. Web.

Moran, N. & Oppenheim M. (2018) FireEye Inc. 1-16. Web.

Narwal, B., Mohapatra, A. K., & Usmani, K. A. (2019). Journal of Statistics and Management Systems, 22(2), 301-325. Web.