This literature review focuses on the cyber security issue of hacking. It reviews a journal article about identity theft and cyber crime, and discusses the strengths and shortcomings of the article. The review concludes that hacking is a malevolent drawback of the cyberworld that should be penalized, and strategies should be implemented to prevent it.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head:THE CYBER SECURITY ISSUE OF HACKING The Cyber Security Issue of Hacking Name of the Student Name of the University Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1THE CYBER SECURITY ISSUE OF HACKING Table of Contents Introduction......................................................................................................................................2 Paper under review......................................................................................................................2 Justification for paper selection...................................................................................................2 Summary of findings...................................................................................................................2 Strengths of the articles...............................................................................................................3 Shortcomings of the articles........................................................................................................3 Conclusion.......................................................................................................................................4 Reference.........................................................................................................................................5
2THE CYBER SECURITY ISSUE OF HACKING Introduction Information transfer is the primary service that the cyberworld provides us. Data and information forms the most important components of the cyberworld, which always remains at a risk of being breached by malicious people with impeccable knowledge of hacking (Marsh 2017). A security hacker on the other hand specializes in breaching security of a system in the cyber environment especially used to protect confidential and sensitive data. The following literature review would focus on this topic by reviewing relevant topics regarding this topic. This would further be followed by justification behind the selection of the journals, the summary of the findings along with the strengths and shortcomings of the journals that have been reviewed. Paper under review 1.Edwards,C.,2014.Endingidentitytheftandcybercrime.BiometricTechnology Today,2014(2), pp.9-11. Justification for paper selection Papers selected for journal reviews should possess the capability of being able to hold the theme of the literature review about which the study is being conducted. The journal selected in this regard is expected to have a wide range of description about the topic, which is about the cyber security issues that hacking causes. This paper has been selected in this regard since it describes the issues about identity theft that is induced by hacking and the issues thus created in the cyberworld. (Edwards 2014). This paper elaborates the fact that when any hacker tries to impersonate an innocent person, in order to perform this action he or she has to embezzle the personal data. This clearly depicts an idea that any kind of identity theft is an atrocious and punishable offense is it for any reason. Identity theft is regarded as one of the most intricate issues of hacking in the cyberworld. The selection is justified since the paper focuses about a specific hacking issue and the problems that are caused in the cyberworld along with legal obligations
3THE CYBER SECURITY ISSUE OF HACKING Summary of findings The paper under review possesses information about the cybercrimes that have been in vogue since the inception of the cyberworld. The findings lead to the learning outcomes about the cyber security threats, the issues that can be regarded as cybercrime, the history about hacking and the affects of hacking that impact upon the common people and cyberworld. In the journal Edwards (2014) states the issues that are regarded as hacking. This state that unable to authorize is also regarded as cybercrime and is a punishable offence. This is mainly done by the malicious hackers to steal the online identity of a person and posing as someone else to hide the malicious acts that one commits. In this journal, hacking has been regarded as one of the main drawbacks that internet has as a byproduct. Electronification of the world has eased up communication and has solved many other issues, however; it has also imposeddatavulnerabilitytomalevolentusershavingdesperateattemptstocommit cybercrimes. It is also mentioned in this paper that until this problem finds a proper solution regarding proper authentication of a person and the prevention of stealing online identities, the issues would persist and become much worse in the coming times. Strengths of the articles The strength of the article is that it focuses on every aspect of a hacking generated with identity theft, also describing the facts about the proliferation of the cybercrimes and the first war that was induced due to the identity hackings that took place in Iran by 2010 in Bushehr Nuclear Plant (Singh 2015). The paper also suggests the solution about how these hackings could be prevented as identity theft is dangerous and may even impose innocent people of crimes that they have not committed (Van Wilsem 2011). Shortcomings of the articles The shortcoming of the first article is that it never clarifies the proper structure of a journal recommending a collective solution for the problems (Cerrudo 2015). However, it suggests eliminating third-party authentication entirely, discarding digital evidence preservation (Clarke and Knake 2014). A concluding accumulation of all the information could not be found in this journal article that would generate a wholesome idea on having a proper ending to the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4THE CYBER SECURITY ISSUE OF HACKING journal. This journal even fails to put forward the ways in which an individual can be absolutely sure about his or her identity over the cyberworld. Conclusion Therefore, in conclusion it can be stated that hacking is a malevolent drawback that the cyberworld possesses and it should be penalized, also having strategies implied by people as well as organizations to prevent hacking. The paper reviewed in regards to the literature has been justified in this for their selection. The findings that has provided a clear view about the types of hacking and also the shortcomings and strengths the paper possesses. The paper also provides the information about the organizational losses and the interventions hackers have caused to humongous organizations and the individual users with online identities as well. This clearly puts the picture that the invention of cyberworld has been a revolution in the technological era but hacking is the only malicious byproduct the world of internet possesses.
5THE CYBER SECURITY ISSUE OF HACKING Reference Cerrudo,C.,(2015).Anemergingus(andworld)threat:Citieswideopentocyber attacks.Securing Smart Cities. Clarke, R.A. and Knake, R.K., (2014).Cyber war. Tantor Media, Incorporated. Edwards,C.,(2014).Endingidentitytheftandcybercrime.BiometricTechnology Today,2014(2), pp.9-11. Marsh, D., (2017).Are Ethical Hackers the Best Solution for Combating the Growing World of Cyber-Crime?(Doctoraldissertation,UniversityHonorsCollege,MiddleTennesseeState University). Nizami, S.M. and Naqvi, G., (2017). The Reality of Cyber Security.International Journal for Electronic Crime Investigation, p.11. SHORT TAKES, Journal of Business Strategy, (1999), Vol. 20 Issue: 3, pp.3-4 Singh,J.,(2015).Violenceagainstwomenincyberworld:aspecialreferenceto India.International Journal of Advanced Research in Management and Social Sciences,4(1), pp.60-76. Van Wilsem, J., (2011). Worlds tied together? Online and non-domestic routine activities and theirimpactondigitalandtraditionalthreatvictimization.EuropeanJournalof Criminology,8(2), pp.115-127.