logo

Cyber Security: Cases of Cybercrime and Prevention Measures

   

Added on  2023-06-05

17 Pages3464 Words424 Views
Political Science
 | 
 | 
 | 
Running head: Cyber security 1
Cyber security
Student’s Name
Institution
Cyber Security: Cases of Cybercrime and Prevention Measures_1

Cyber security 2
Table of Contents
1. What the cases say about cybercrime...............................................................................3
2. Introduction.........................................................................................................................5
Ransom ware attack...................................................................................................................6
Attack on NHS.........................................................................................................................6
Effect........................................................................................................................................6
Ethical issues............................................................................................................................7
Legal issues..............................................................................................................................7
Attack on Telefonica....................................................................................................................7
Effect........................................................................................................................................7
Ethical issues............................................................................................................................7
Legal issues..............................................................................................................................8
Attack on FedEx...........................................................................................................................8
Effect........................................................................................................................................8
Ethical issues............................................................................................................................8
Legal issues..............................................................................................................................8
Attack on Hitachi.........................................................................................................................8
Effect........................................................................................................................................9
Ethical issues............................................................................................................................9
Legal issues..............................................................................................................................9
DDOS attack...............................................................................................................................9
Effect........................................................................................................................................9
Ethical issues..........................................................................................................................10
Attack on Mybet.........................................................................................................................10
Effect......................................................................................................................................10
Ethical issues..........................................................................................................................10
Legal issues............................................................................................................................10
Attack on Dyn............................................................................................................................10
Effect......................................................................................................................................11
Ethical issues..........................................................................................................................11
Legal issues............................................................................................................................11
Attack on Aljazeera....................................................................................................................11
Cyber Security: Cases of Cybercrime and Prevention Measures_2

Cyber security 3
Effect......................................................................................................................................11
Legal issues............................................................................................................................11
Summary for the articles.........................................................................................................12
7. Conclusion.............................................................................................................................13
8. Summary and discussion.....................................................................................................14
9. Recommendations and solution..........................................................................................15
References.................................................................................................................................16
1. What the cases say about cybercrime.
Cybercrime is a type of crime that criminals use to exploit the convenience, speed and the
privacy of the internet in order to execute a wide range of criminal acts that are either physical or
virtual and that cause severe harm and pose threat to organizations and victim’s worldwide
(Taylor, 2014). It can be noted that, cybercrime has brought about ethical issues such as:
i. To gain access to information illegally
This is a form of hacking whereby a person sends instructions that are illegal to a
computer or network (White, 2017). The attacker uses different types of software’s such
as Metaspliot which is used to penetrate through vulnerable security systems. Such tools
are used by attackers to crack into a person’s computer without his/her knowledge from a
remote location. This information can be used to gain access to email passwords, credit
card numbers and any other sensitive information such as bank account information.
ii. Issuing threats such as asking for ransom
Cybercrime has also been used by attackers as means of soliciting money from
individuals and organizations. Different tools such as the scare ware, screen lockers and
encrypting ransom ware. These software’s are used to curtail users from gaining access to
Cyber Security: Cases of Cybercrime and Prevention Measures_3

Cyber security 4
computer systems of personal files until demands for the payment of a ransom is met to
regain access to these files (Nagunwa, 2014).
iii. Denial of service
This occurs when attackers can use tools such as the LOIC (Low Orbit Ion Canon) to
attack unprotected networks. A DoS attack occurs when an attacker makes a computer
system or a server unavailable thereby bringing the service down. This happens when the
servers request queue is flooded with fake requests. These type of attack is of two forms
in that there is one that floods the service while the other crashes the server (Fung, 2015).
It is therefore clear that cyber-crime targets mostly rich organizations such as banks,
hospitals, financial firms and casinos. The reason as to why cyber attackers wants to
interfere with these systems is because they always aim to make big money easily.
According to (Cerrudo, 2015), the following reasons are as to why systems in these
organizations are prone to attacks:
a. Complexity – cyber criminals always take the advantage of the complexity of the
operating system. The more complex these operating systems are the easier it is
for a cyber-criminals to take advantage of.
b. Negligence – this is another factor that provides attackers the control and access
over computer systems. Activities such as failing to log out from computers, lack
of use of antiviruses makes it easy for an attacker have control over the systems.
It is therefore advisable for every individual to take control of his/her actions
while using these systems in providing a degree of security.
Cyber Security: Cases of Cybercrime and Prevention Measures_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Hackers Without Borders: A Legal Response
|11
|2715
|251

Ethical Hacking as a Defence Mechanism
|10
|1909
|378

Project Report on Cyber Attack Prevention System
|10
|2286
|296

Digital Security: Principles, Cryptography, Secure Programming Techniques
|16
|3334
|170

Applying Ethical Theory to Cybercrime: A Case Study and Analysis
|8
|1766
|358