logo

Cyber-crime and Cyber Espionage- Report

13 Pages3229 Words212 Views
   

Added on  2020-02-24

Cyber-crime and Cyber Espionage- Report

   Added on 2020-02-24

ShareRelated Documents
Running head: CYBER-CRIME AND CYBER ESPIONAGECyber Crime and Cyber EspionageName of the StudentName of the UniversityAuthor Note
Cyber-crime and Cyber Espionage- Report_1
CYBER-CRIME AND CYBER ESPIONAGEExecutive SummaryCyber-crime is growing in intensity, and modern criminals seem to have clear, almostbusiness-like objectives. The issue of cyber-crime is complex, and in order tounderstand it better, deeper insight into all different aspects related to cyber-crime it isneeded. The current deliverable is a part of the Cyber-crime project. In this workpackage, the aim was to analyse the structures and drivers behind cyber-crime, theireconomies and criminal revenue streams; and to develop perpetrator and victim“journeys”. Espionage between nation and states is hardly a new phenomenon, but inthe last few decades, the world had moved into a completely new realm of spying: cyberespionage. This report will provide some background on cyber espionage, includingwhat it is, how it works, how it is used, and who is using it. This paper will also analysehow cyber espionage is affecting the world today and describe some possible methodsfor nations and states to protect themselves against cyber-attacks. Following reportfocuses on the cyber-crime and cyber espionage and their impacts on human. Severalexamples have been taken in order to show the severity of such unwanted surveillanceand activities.
Cyber-crime and Cyber Espionage- Report_2
CYBER-CRIME AND CYBER ESPIONAGETable of ContentsIntroduction........................................................................................................................4Cyber-Crime.......................................................................................................................4Most Vicious Cyber-Crime around the Globe....................................................................5Why this Happens?............................................................................................................5Security threats..................................................................................................................6Preventive Measures.........................................................................................................6Impact of Cyber-crime.......................................................................................................7Cyber-Espionage...............................................................................................................8Examples of Cyber-Espionage..........................................................................................8Why this Happens?............................................................................................................8Preventive measures.........................................................................................................9Impact of Cyber Espionage.............................................................................................10Conclusion.......................................................................................................................10References:......................................................................................................................12
Cyber-crime and Cyber Espionage- Report_3
CYBER-CRIME AND CYBER ESPIONAGEIntroductionThe aim of this report is to provide light on the topics cyber-crime and cyber-Espionage, which can be considered as the most vicious threat to the privacy and thesecurity of an individual in this new era of technology. Cyber-crime and cyber-espionageboth are illegal in the eyes of law and both are same in a way as both of them access tothe data and information of the population without their authority or permission.However, one is done for personal profit (Cyber-crime), and the government for thebenefits of the communities performs another (Cyber-Espionage). This report putemphasis on such intrusions and focuses on certain preventive measures, which can beimplemented before and after the attack to protect personal information and data. Howthe intruders let, these intrusions have also been proposed in this report. Severalexamples of cyber-crime and cyber-espionage have also been proposed in this report toshow that how much an individual, group of individual, an organization or commonpeople be affected by such cyber-crimes.Cyber-CrimeCybercrime is defined as a crime in which a computer is the object of the crime(hacking, phishing, spamming) or is used as a tool to commit an offense (childpornography, hate crimes) (Mc Guire and Dowling 2013). Cybercriminals may usecomputer technology to access personal information, business trade secrets or use theinternet for exploitive or malicious purposes. Criminals can also use computers forcommunication and document or data storage. Criminals who perform these illegalactivities are often referred to as hackers.Cybercrime encompasses a wide range of activities, but these can generally bebroken into two categories:Crimes, which target the computer networks or systems. These types of crimesinclude viruses and denial-of-service (DoS) attacks (Choo and 2013).
Cyber-crime and Cyber Espionage- Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Policies of the United States Assignment PDF
|8
|1831
|117

Can we predict cyber-crime rather than simply respond to it?
|10
|3304
|51

CYBER SECURITY Name: Student Id: Name of univeristy:.
|8
|4621
|39

Cyber Terrorism Assignment
|11
|2353
|135

(solved) Essay on Cyber Issues
|20
|4326
|169

Business Proposal on Cyber Security
|9
|599
|244