Cyber Crime Report: Analysis of Statistics and Mitigation

Verified

Added on  2019/10/09

|5
|611
|487
Report
AI Summary
This report provides an analysis of cyber crime, examining various types of cyber crimes such as sensitive data breaches, intellectual property theft, child pornography, tax refund fraud, and copyright infringement. It discusses the methodologies used in data collection, including random sampling and online questionnaires, highlighting their strengths and weaknesses. The report analyzes the differences in data collection methods and summarizes a survey that emphasizes the importance of security intelligence systems in mitigating cyber threats. The conclusion underscores the need for proactive measures to combat cyber crime, which affects organizations of all sizes, emphasizing the urgency and cost implications of addressing these threats promptly. The report references several sources to support its findings and recommendations.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber Crime
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Five examples of computer crime
a. Sensitive data
Information stored by the source code, business hacked by the competitors which impact
on the financials of the company. It can be mitigated through high information security.
b. Intellectual property
The blueprint of products and manufacturing plans are hacked by the Chinese producers
which occur due to lack of information security (Choo et al., 2013). It can be prevented
by using high information security.
c. Child pornography
It is the case of pornography that occurs due to abuse of the child at the time of sexual
acts which are recorded in the production of child pornography. It can be protected by
parents accessing networks of the children, and it occurs due to parent’s carelessness.
d. Tax refund fraud
Filing of false returns and it occurs due to improper authenticity checking by IRS. The
loss was approximately 14 Million, and it can be mitigated by proper authenticity
checking.
e. Copyright infringement
It is the case of the copy of work by another publisher which is a computer crime. The
loss is faced by the original publisher who loses its customers. It is done in the absence of
poor security, and it can be resolved through negotiation.
Document Page
2. Computer crime statistics
a. Methodology
In the national computer security survey random sampling method is used and The CBS has
collected the information through an online questionnaire (Anon et al., 2016). The strength of
random sampling is that it represents the target population and eliminates the sampling bias
(Anon et al., 2016). The weakness of method is that it is difficult to achieve. The strength of
online questionnaire is that it is the fastest method of collecting data and the weakness is that it
can be accessed through internet only.
b. Difference in two data
The data is collected through offline in random sampling whereas the in online questionnaire
data is collected through online mode only.
c. Reason of difference
The reason of the difference is due to the difference in sources of collecting the data.
3. Cyber crime study
a. Summarization of survey
The company is using security intelligence system as the safeguard which helps to determine the
cyber threat more effectively.
Document Page
b. Summary of conclusion
The conclusion of the survey is that cyber crime is the major threat for the companies which
need to be protected through using security intelligence system which helps to protect the
information technology (McGuire et al., 2013). The cyber attacks need to be resolved quickly
because it becomes costly with time. All are the victims of cyber crimes, and it is a common
occurrence which varies by organizational sizes.
c. Statement
I totally agree with the statement because cybercrime is a major threat which needs to be
identified and resolved quickly. All the industries are victims, and threat varies with the size of
the company.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Anon, (2016). [online] Available at:
https://www.kpmg.com/IN/en/IssuesAndInsights/ArticlesPublications/Documents/
KPMG_Cyber_Crime_survey_report_2014.pdf [Accessed 17 Nov. 2016].
McGuire, M., & Dowling, S. (2013). Cyber crime: A review of the evidence. Summary of key
findings and implications. Home Office Research report, 75.
Choo, K. K. R., & Grabosky, P. (2013). Cyber crime.
Anon, (2016). [online] Available at: http://www.bjs.gov/index.cfm?
ty=dcdetail&iid=260#Methodology [Accessed 17 Nov. 2016].
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]