logo

Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies

Understanding the increase in computer-related security incidents, common types of computer security attacks, perpetrators of computer crime, managing security vulnerabilities, response to security incidents, computer forensics, and ethical issues in safeguarding data and information systems.

4 Pages760 Words231 Views
   

Added on  2023-06-14

About This Document

This article discusses the impact of cybercrime on Australia and the types of cybercrime, perpetrators, and mitigation strategies. It also highlights the Spam Act passed by the ACMA. The article is based on research articles and real-life cybercrime attacks.

Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies

Understanding the increase in computer-related security incidents, common types of computer security attacks, perpetrators of computer crime, managing security vulnerabilities, response to security incidents, computer forensics, and ethical issues in safeguarding data and information systems.

   Added on 2023-06-14

ShareRelated Documents
Running head: CYBERCRIME
CYBERCRIME
Name of the University
Name of the student
Author Note
Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies_1
1CYBERCRIME
After reviewing the Symantec Cybercrime Report, I was shocked to find out that
Australia is present in the list of top ten countries that are severely affected by cyber-attacks.
After researching a bit further, I realized that the number of cyber-attacks in Australia has
doubled since last year. In 2016, more than 60% of the businesses in Australia has faced a
cyber-vulnerability on a monthly basis (Holt, Bossler & Seigfried-Spellar, 2015).
I already had a vague idea about cybercrime that it was usually conducted through
computers for illicit purposes such as child pornography, trafficking, stealing of intellectual
property and banking fraud. To understand about the cybercrimes, I had to understand why
the attacks were so prevalent nowadays. The first reason I found out was that the increasing
complexity of the computer systems was the main reason for the increasing vulnerability.
Recently, researchers found a vulnerability which utilized a complex system of processors
named speculative execution to extract user data. The second reason was related to higher
consumer expectations.
Next, I studied some research articles to understand the types of exploits. A code
which is programmable and forces a computer to behave in an unexpected way is known as
Virus. A Worm is a malicious program that attaches itself in a computer’s memory to
duplicate itself. A Trojan horse is a hidden malicious code inside a harmless program that
activates itself during a specific event. DDoS attacks causes a computer or a server to flood
the targeted system with continuous requests for data and tasks (Yar, 2013). Other lesser
known cyber threats are spams, rootkits and phishing. One particular threat called botnets
caught my attention. Botnets are used to control a number of computers by the attacker from
a remote location without the knowledge of the user. The affected computers are used to
distribute malicious codes.
Understanding Cybercrime: Types, Perpetrators, and Mitigation Strategies_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital/Cybercrime Evolution, Detection, and Prevention
|9
|1830
|261

Cyber Security: A Review of Cyber Dependent Crimes and Techniques Used by Experts
|5
|1329
|138

Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware
|5
|1791
|347

Hackers Without Borders: A Legal Response
|11
|2715
|251

Security threats Assignment PDF
|17
|5254
|133

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73