1 HACKERPOCALYPSE Table of Contents 1. Introduction............................................................................................................................2 2. Discussion..............................................................................................................................2 2.1 Main points in the Case Study.........................................................................................2 2.2 Perspective of Brian Krebs with Justification..................................................................2 2.3 Personal Reflection of Changing Behaviour at Home and Work....................................3 3. Conclusion..............................................................................................................................3 References..................................................................................................................................4
2 HACKERPOCALYPSE 1. Introduction Cybercrime can be referred to as a crime, which includes a network and a computer (Yar and Steinmetz 2019). The system might have been utilized for crime purpose and it could easily harm the overall reputation of victim so that physical or mental harm is being caused (Moore 2014). The following report will be outlining a brief discussion on the case study of Hackerpocalypse. 2. Discussion 2.1 Main points in the Case Study Cybersecurity ventures has predicted the globalized annual costs of cybercrime for growing from 3 trillion dollars in the year of 2015 to 6 trillion dollars within the year of 2021 (Hackerpocalypse:ACybercrimeRevelation.2016).Itinvolvesdatadestruction,lost productivity, fraudulent attempts, theft of financial or personal data and intellectual property, deletion of the hacked data as well as stolen money. These threats have eventually evolved from harming the computers, smartphones and networks (Holt, Burruss and Bossler 2015). There exists a lack of effective law enforcement for the financial cybercrimes and due to the high workforce shortage in cyber security sector, the jobs are left unoccupied (Herley 2014). Moreover, the databases and infrastructures of information technology are eventually facing highly complicated cyber-attacks (Ablon, Libicki and Golay 2014). The businesses as well as government is fighting back against the cyber threats by providing security awareness training so that an effective strategy is being made. 2.2 Perspective of Brian Krebs with Justification Brian Krebs is one of the most top minds in the entire industry of cybersecurity. According to Krebs, the most significant and dangerous cyber threat could be referred to as feeling of being dependent on the entire technology (Holt and Bossler 2014). One should not
3 HACKERPOCALYPSE be completely dependent on the technology since it enhances personal corner of the cyber space. Moreover, it is evident that any software could be completely error free and this could give rise to the flawed or outdated software and hardware; hence providing scope for nefarious attacks for disruption of the free speech or globalized commerce (Leukfeldt and Yar 2016). The privacy of the data is also being intercepted due to such attacks. Krebs even mentioned that he had no compensation for the contribution he made and he does not have any affiliation with Cybersecurity Ventures or any other sponsors (Al-garadi, Varathan and Ravana 2016). He not only addressed to the citizens of US, but also globally to other citizens and nations. 2.3 Personal Reflection of Changing Behaviour at Home and Work I, after reading the article of Hackerpocalypse have felt a strong need of changing my behaviour both at home and work (Leukfeldt 2014). I was not concerned about cyber security and cyber threats in the beginning, however, after reading the case study, I understood that it is extremely important and significant to secure every device or system from cyber-attacks on a priority basis (Finklea and Theohary 2015). 3. Conclusion Therefore, from the above discussion, it can be concluded that cybercrime is a type of offence that is being committed against the group of individuals with subsequent criminal motives for intentionally or unintentionally harming the person. The above report has clearly outlined the case study of Hackerpocalypse with proper details.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 HACKERPOCALYPSE References Ablon, L., Libicki, M.C. and Golay, A.A., 2014.Markets for cybercrime tools and stolen data: Hackers' bazaar. Rand Corporation. Al-garadi, M.A., Varathan, K.D. and Ravana, S.D., 2016. Cybercrime detection in online communications:TheexperimentalcaseofcyberbullyingdetectionintheTwitter network.Computers in Human Behavior,63, pp.433-443. Finklea,K.M.andTheohary,C.A.,2015,January.Cybercrime:conceptualissuesfor congress and US law enforcement. Congressional Research Service, Library of Congress. Hackerpocalypse:ACybercrimeRevelation.2016.[online].Accessedfrom https://www.herjavecgroup.com/hackerpocalypse-cybercrime-report/[Accessedon16 August 2019]. Herley, C., 2014. Security, cybercrime, and scale.Commun. ACM,57(9), pp.64-71. Holt, T.J. and Bossler, A.M., 2014. An assessment of the current state of cybercrime scholarship.Deviant Behavior,35(1), pp.20-40. Holt, T.J., Burruss, G.W. and Bossler, A., 2015. Policing cybercrime and cyberterror. Leukfeldt, E.R. and Yar, M., 2016. Applying routine activity theory to cybercrime: A theoretical and empirical analysis.Deviant Behavior,37(3), pp.263-280. Leukfeldt, E.R., 2014. Cybercrime and social ties.Trends in organized crime,17(4), pp.231- 249. Moore, R., 2014.Cybercrime: Investigating high-technology computer crime. Routledge. Yar, M. and Steinmetz, K.F., 2019.Cybercrime and society. SAGE Publications Limited.