Hackerpocalypse: A Cybercrime Revelation Case Study 2022

Verified

Added on  2022/10/06

|5
|965
|18
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: HACKERPOCALYPSE
Case Study 2: Hackerpocalypse: A Cybercrime Revelation
Name of the Student
Name of the University
Author’s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
HACKERPOCALYPSE
Table of Contents
1. Introduction............................................................................................................................2
2. Discussion..............................................................................................................................2
2.1 Main points in the Case Study.........................................................................................2
2.2 Perspective of Brian Krebs with Justification..................................................................2
2.3 Personal Reflection of Changing Behaviour at Home and Work....................................3
3. Conclusion..............................................................................................................................3
References..................................................................................................................................4
Document Page
2
HACKERPOCALYPSE
1. Introduction
Cybercrime can be referred to as a crime, which includes a network and a computer
(Yar and Steinmetz 2019). The system might have been utilized for crime purpose and it
could easily harm the overall reputation of victim so that physical or mental harm is being
caused (Moore 2014). The following report will be outlining a brief discussion on the case
study of Hackerpocalypse.
2. Discussion
2.1 Main points in the Case Study
Cybersecurity ventures has predicted the globalized annual costs of cybercrime for
growing from 3 trillion dollars in the year of 2015 to 6 trillion dollars within the year of 2021
(Hackerpocalypse: A Cybercrime Revelation. 2016). It involves data destruction, lost
productivity, fraudulent attempts, theft of financial or personal data and intellectual property,
deletion of the hacked data as well as stolen money. These threats have eventually evolved
from harming the computers, smartphones and networks (Holt, Burruss and Bossler 2015).
There exists a lack of effective law enforcement for the financial cybercrimes and due to the
high workforce shortage in cyber security sector, the jobs are left unoccupied (Herley 2014).
Moreover, the databases and infrastructures of information technology are eventually facing
highly complicated cyber-attacks (Ablon, Libicki and Golay 2014). The businesses as well as
government is fighting back against the cyber threats by providing security awareness
training so that an effective strategy is being made.
2.2 Perspective of Brian Krebs with Justification
Brian Krebs is one of the most top minds in the entire industry of cybersecurity.
According to Krebs, the most significant and dangerous cyber threat could be referred to as
feeling of being dependent on the entire technology (Holt and Bossler 2014). One should not
Document Page
3
HACKERPOCALYPSE
be completely dependent on the technology since it enhances personal corner of the cyber
space. Moreover, it is evident that any software could be completely error free and this could
give rise to the flawed or outdated software and hardware; hence providing scope for
nefarious attacks for disruption of the free speech or globalized commerce (Leukfeldt and
Yar 2016). The privacy of the data is also being intercepted due to such attacks. Krebs even
mentioned that he had no compensation for the contribution he made and he does not have
any affiliation with Cybersecurity Ventures or any other sponsors (Al-garadi, Varathan and
Ravana 2016). He not only addressed to the citizens of US, but also globally to other citizens
and nations.
2.3 Personal Reflection of Changing Behaviour at Home and Work
I, after reading the article of Hackerpocalypse have felt a strong need of changing my
behaviour both at home and work (Leukfeldt 2014). I was not concerned about cyber security
and cyber threats in the beginning, however, after reading the case study, I understood that it
is extremely important and significant to secure every device or system from cyber-attacks on
a priority basis (Finklea and Theohary 2015).
3. Conclusion
Therefore, from the above discussion, it can be concluded that cybercrime is a type of
offence that is being committed against the group of individuals with subsequent criminal
motives for intentionally or unintentionally harming the person. The above report has clearly
outlined the case study of Hackerpocalypse with proper details.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4
HACKERPOCALYPSE
References
Ablon, L., Libicki, M.C. and Golay, A.A., 2014. Markets for cybercrime tools and stolen
data: Hackers' bazaar. Rand Corporation.
Al-garadi, M.A., Varathan, K.D. and Ravana, S.D., 2016. Cybercrime detection in online
communications: The experimental case of cyberbullying detection in the Twitter
network. Computers in Human Behavior, 63, pp.433-443.
Finklea, K.M. and Theohary, C.A., 2015, January. Cybercrime: conceptual issues for
congress and US law enforcement. Congressional Research Service, Library of Congress.
Hackerpocalypse: A Cybercrime Revelation. 2016. [online]. Accessed from
https://www.herjavecgroup.com/hackerpocalypse-cybercrime-report/ [Accessed on 16
August 2019].
Herley, C., 2014. Security, cybercrime, and scale. Commun. ACM, 57(9), pp.64-71.
Holt, T.J. and Bossler, A.M., 2014. An assessment of the current state of cybercrime
scholarship. Deviant Behavior, 35(1), pp.20-40.
Holt, T.J., Burruss, G.W. and Bossler, A., 2015. Policing cybercrime and cyberterror.
Leukfeldt, E.R. and Yar, M., 2016. Applying routine activity theory to cybercrime: A
theoretical and empirical analysis. Deviant Behavior, 37(3), pp.263-280.
Leukfeldt, E.R., 2014. Cybercrime and social ties. Trends in organized crime, 17(4), pp.231-
249.
Moore, R., 2014. Cybercrime: Investigating high-technology computer crime. Routledge.
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. SAGE Publications Limited.
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]