The assignment content discusses various types of computer crimes, including sensitive data breaches, intellectual property theft, child pornography, tax refund fraud, and copyright infringement. It also presents statistics on cybercrime and emphasizes the need for robust information security measures to mitigate these threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Cyber Crime
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1.Five examples of computer crime a.Sensitive data Information stored by the source code, business hacked by the competitors which impact on the financials of the company. It can be mitigated through high information security. b.Intellectual property The blueprint of products and manufacturing plans are hacked by the Chinese producers which occur due to lack of information security (Choo et al., 2013). It can be prevented by using high information security. c.Child pornography It is the case of pornography that occurs due to abuse of the child at the time of sexual acts which are recorded in the production of child pornography. It can be protected by parents accessing networks of the children, and it occurs due to parent’s carelessness. d.Tax refund fraud Filing of false returns and it occurs due to improper authenticity checking by IRS. The loss was approximately 14 Million, and it can be mitigated by proper authenticity checking. e.Copyright infringement It is the case of the copy of work by another publisher which is a computer crime. The loss is faced by the original publisher who loses its customers. It is done in the absence of poor security, and it can be resolved through negotiation.
2.Computer crime statistics a.Methodology In the national computer security survey random sampling method is used and The CBS has collected the information through an online questionnaire (Anon et al., 2016). The strength of random sampling is that it represents the target population and eliminates the sampling bias (Anon et al., 2016). The weakness of method is that it is difficult to achieve. The strength of online questionnaire is that it is the fastest method of collecting data and the weakness is that it can be accessed through internet only. b.Difference in two data The data is collected through offline in random sampling whereas the in online questionnaire data is collected through online mode only. c.Reason of difference The reason of the difference is due to the difference in sources of collecting the data. 3.Cyber crime study a.Summarization of survey The company is using security intelligence system as the safeguard which helps to determine the cyber threat more effectively.
b.Summary of conclusion The conclusion of the survey is that cyber crime is the major threat for the companies which need to be protected through using security intelligence system which helps to protect the information technology (McGuire et al., 2013). The cyber attacks need to be resolved quickly because it becomes costly with time. All are the victims of cyber crimes, and it is a common occurrence which varies by organizational sizes. c.Statement I totally agree with the statement because cybercrime is a major threat which needs to be identified and resolved quickly. All the industries are victims, and threat varies with the size of the company.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References Anon, (2016). [online] Available at: https://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/ KPMG_Cyber_Crime_survey_report_2014.pdf [Accessed 17 Nov. 2016]. McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence.Summary of key findings and implications. Home Office Research report,75. Choo, K. K. R., & Grabosky, P. (2013). Cyber crime. Anon, (2016). [online] Available at: http://www.bjs.gov/index.cfm? ty=dcdetail&iid=260#Methodology [Accessed 17 Nov. 2016].