logo

Cyber Criminal Cases Project 2022

   

Added on  2022-09-15

9 Pages1961 Words26 Views
Running Head: CYBER CRIMINAL CASES
Cyber Criminal Cases
Name of the Student
Name of the University
Author Note

Running Head: CYBER CRIMINAL CASES
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
No 1- Pitney Bowes Operations is Disrupted by the Ransomware Attack..................................3
No 2- The Agent Smith- The New Virus to Hit the Mobile Devices.........................................4
No 3- Cyberattacks in the Middle East........................................................................................5
Evaluation........................................................................................................................................6
Conclusion.......................................................................................................................................7
Reference.........................................................................................................................................8

Running Head: CYBER CRIMINAL CASES
Introduction
The cybercrime is referred to as all of the illegal activities which are carried out having
used the technologies. The cybercriminals range from the rogue individuals for organizing all of
the crime groups to the factions sponsored by the state and almost all of the malwares such as
social engineering and phishing are used for pursuing the nefarious plans. It is surprising to note
that the cybercrime is professionalized and organized incredibly (Van Wegberg et al., 2018)..
The people who are engaged in such crimes buy and sell the malwares online having traded in
some services for tracking the malware deployment along with the tech support. The
proliferation and the professionalization of the cybercrime help in adding up the countless
expense in the damages every year which impacts on the businesses, the individuals and the
governments (Gercke, 2016).. The IoT or the Internet of Things has evolved and also the smart
devices have become quite popular. Significantly, the cybercriminals usually benefit from the
broader attack surface which increases the scope of penetrating the security, achieving the
unauthorized accesses (Hui, Kim & Wang, 2017).. It is found that the cybercriminals range from
the individuals to the criminal companies. For example, it starts with a hacker hacking into the
US stock market to the State Sponsored groups which propagated the ransomware on a massive
scale. Notably, it does not need the expert skill for becoming a cybercrook. In this project, three
real life cybercrimes which have occurred over the past 12 months will be analyzed and
evaluated.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Laws: Examples of Cybercrime, Personal Information in E-commerce, Emerging Online Frauds, Trade Secrets
|8
|2369
|81

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Contemporary Issues in Crime, Safety and Security
|15
|3605
|167

ICT80003 Impact of Cybercrime: Challenges and Tactics
|6
|2178
|171

How to Recognize and Avoid Cybercrime in Australia
|10
|2834
|65

Cyber Crimes: Impact, Classification, and Fight Against It
|13
|3500
|396