Cyber Crime Prevention Program

Read Complete Research Material



Cyber Crime Prevention Program

[ and Number]

Introduction3

Literature Review5

Cyber Crime5

Categories of Cyber Crimes6

Cyber Crime Prevention Program8

Logging of Critical Event8

Response and Recovery Plan9

Installation of Firewalls9

Recruitment of Proficient Cyber Security Practitioners10

Conclusion11

Cyber Crime Prevention Program

Introduction

Cyber crime has emerged as one of the fastest growing crime over the world wide network, as more and more criminals are now taking advantage of the speed, convenience and anonymity offered by modern technologies to carry out various types of criminal activity. These include attacks against computer systems and data, identity theft, distribution of images of child sexual abuse, scams auctions conducted over the Internet, intrusion in online financial services, spreading viruses, botnets (networks of computers infected controlled by remote users) and different types of scams perpetrated via email, such as phishing (fraudulent acquisition of sensitive personal information).Cyber crimes are acts in which a device is used as electronic and computer means to commit a crime (Hunton, 2010). Cyber crime is no crime under existing laws of the State of San Luis Potosi, but there is, and the main focus on prevention is to provide the public tools to prevent such crimes (Ophardt, 2010). Comprehensive prevention of crime begins to have knowledge of the different types of cybercrime and know how to act in the event it occurs.

Cybercrime is generally defined as any kind of illegal activity on the Internet; the internet network could wither be private or public networks (Mathew, Al Hajj, & Al Ruqeishi, 2010). Although many forms of cybercrime revolve around obtaining sensitive information to unauthorized uses, other examples are invasion of privacy of the largest number of computer users. Cyber crime can be combined with three forms of offenses which include:

Specific violations of information technology and communication of these offenses, it identifies violations of the automated processing of data, unauthorized processing of personal data (such as the illegal sale of personal information), offenses credit cards, unauthorized or unreported or interceptions.

Offenses related to information technology and communication: this category includes the child pornography, incitement to terrorism and racial hatred on the internet crimes against persons, crimes against property.

Offenses facilitated by information technology and communication, such as online scams, the money laundering, the counterfeiting or any other breach of intellectual property.

Literature Review

The literature review includes articles from peer-reviewed scholarly journals published in English and obtained from several online research databases (ProQuest, Google Scholar, ScienceDirect, Wiley InterScience, Scopus, JSTOR, and EBSCO libraries [Academic Search Premier and Business Source Premier]). The literature review includes an examination of articles related to the variables and the theories selected for this study. Another major component of the literature review is the subjects of the study, cyber security practitioners.

Cyber Crime

Harris (2010) delineated cyber crime as an attempt to compromise the availability, confidentiality, and integrity of information assets present over the internet. The act of cyber crime is typically performed through the interception, interference, theft, or destruction of computer systems, networks, or data. In many cases, cyber attacks are designed to steal sensitive information without the victims realizing that a cyber attack has taken ...
Related Ads