Cybercrime and IT Security: Threats, Policies, and NHS Attacks
VerifiedAdded on 2020/04/29
|6
|1089
|119
Report
AI Summary
This report delves into the multifaceted realm of cybercrime and IT security, providing a comprehensive overview of the challenges and solutions in the digital landscape. It begins by defining cybercrime and highlighting the crucial role of IT security professionals in mitigating threats through the use of antivirus software and robust security policies. The report then explores the function of computer forensics in investigating cybercrimes, emphasizing its role in collecting evidence, providing technological support, and assisting law enforcement. It further examines the importance of IT security policies, particularly in the context of South African government regulations, and their role in preventing unauthorized access and data breaches. The report also discusses the impact of cybercrime on critical infrastructure, using the NHS cyberattack as a case study to illustrate the devastating consequences of data loss and system vulnerabilities. Finally, the report underscores the importance of proactive security measures and the need for continuous adaptation to address the evolving nature of cyber threats.

Running head: CYBERCRIME AND IT SECURITY
CYBERCRIME AND IT SECURITY
Name of the Organization
Name of the Student
Author Note
CYBERCRIME AND IT SECURITY
Name of the Organization
Name of the Student
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
CYBERCRIME AND IT SECURITY
Table of Contents
Cybercrime and the need of IT security professional..........................................................2
Role of computer forensic...................................................................................................2
Important of IT security policies.........................................................................................3
Cybercrime attack on NHS..................................................................................................4
References............................................................................................................................5
CYBERCRIME AND IT SECURITY
Table of Contents
Cybercrime and the need of IT security professional..........................................................2
Role of computer forensic...................................................................................................2
Important of IT security policies.........................................................................................3
Cybercrime attack on NHS..................................................................................................4
References............................................................................................................................5

2
CYBERCRIME AND IT SECURITY
Cybercrime and the need of IT security professional
Cybercrime is an unlawful commotion concerning computer and network. There are
certain fraud cases that may impose by the criminal activities. Internet-connected activities are
susceptible to crime and guide to unfair treatment as efficiently as the common corporal crimes.
IT security persons are the responsible people who can take care of those problems and create a
solution to the people. IT professionals need to so efficient so that they can tackle every situation
for the cybercrime victimization. IT professionals use antivirus software and install certain server
to strengthen the security policy of the device (Kshetri 2013). IT professionals have done their
best to provide the best security in the professional field of work to migrate the cybercrime
issues.
Role of computer forensic
Computer forensic investigates on solving the cybercrime to mitigate the hacking or
terrorism process through the computer. They are not only working over this but also maintain
the resolving process of crime like murder, organized crime, tax evasion, drug smuggling,
robbery cases and terrorism. The roles of computer forensic are
Collecting criminal evidence.
Technological support to analyze the matter.
Law enforcement.
Retrieve information.
Take the efficient step to mitigate the process.
Expertise technique to solve the case.
CYBERCRIME AND IT SECURITY
Cybercrime and the need of IT security professional
Cybercrime is an unlawful commotion concerning computer and network. There are
certain fraud cases that may impose by the criminal activities. Internet-connected activities are
susceptible to crime and guide to unfair treatment as efficiently as the common corporal crimes.
IT security persons are the responsible people who can take care of those problems and create a
solution to the people. IT professionals need to so efficient so that they can tackle every situation
for the cybercrime victimization. IT professionals use antivirus software and install certain server
to strengthen the security policy of the device (Kshetri 2013). IT professionals have done their
best to provide the best security in the professional field of work to migrate the cybercrime
issues.
Role of computer forensic
Computer forensic investigates on solving the cybercrime to mitigate the hacking or
terrorism process through the computer. They are not only working over this but also maintain
the resolving process of crime like murder, organized crime, tax evasion, drug smuggling,
robbery cases and terrorism. The roles of computer forensic are
Collecting criminal evidence.
Technological support to analyze the matter.
Law enforcement.
Retrieve information.
Take the efficient step to mitigate the process.
Expertise technique to solve the case.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
CYBERCRIME AND IT SECURITY
Computers have been usually well-known for being used in committing a crime but as the
position has twisted and forensics has the periphery of using computer forensics to grasp
criminals who considered not being an impression when committing definite crimes (Grabosky
2015).
Important of IT security policies
There are some acts that imposed over the cybercrime policies. By imposing those acts a
South African government can do their best to prevent this kind of situations. Under the
provision sections of 2(1), 3(1), 5(1), 6(1) or 7(1) (a) or (d) any person has found guilty for the
cybercrime issues. Most of the cases are intentional and they doing this cybercrime for the need
of getting extra money by cheating. These all are the unauthorized manner from the personal
point of view to trespass their personal data by the immoral process of entering. In case of
computer program interference subsection 5(2) is being implemented in case of data storage
contemplated by the section of 6(2). As the federal manner of constitution, the South African
government has imposed the article 239 so that these cases can be mitigated. Some of the cases
passwords, access codes are being hacked so that they can access personal data for to acquire and
use those documents for the unethical use (Tsikrika et al. 2017). A restricted computer system
must be implemented so that no one can get into the personal data and acquire that. This is a
safety policy imposed by the South African government for mitigating the cyber crime-related
issues. Any individual who contravene the provisions of section 3(1) or (2), 4(1) or (2), 5(1), 6(1)
or 7(1) is predisposed on conviction to a fine or to incarceration for a phase not more than 10
years or to in cooperation a fine and such incarceration. This is being implemented under the
section of 275 Criminal Procedure Act. These policies are important to get control over the
situation as South Africa has become the third highest cybercrime victimized nation. As the
CYBERCRIME AND IT SECURITY
Computers have been usually well-known for being used in committing a crime but as the
position has twisted and forensics has the periphery of using computer forensics to grasp
criminals who considered not being an impression when committing definite crimes (Grabosky
2015).
Important of IT security policies
There are some acts that imposed over the cybercrime policies. By imposing those acts a
South African government can do their best to prevent this kind of situations. Under the
provision sections of 2(1), 3(1), 5(1), 6(1) or 7(1) (a) or (d) any person has found guilty for the
cybercrime issues. Most of the cases are intentional and they doing this cybercrime for the need
of getting extra money by cheating. These all are the unauthorized manner from the personal
point of view to trespass their personal data by the immoral process of entering. In case of
computer program interference subsection 5(2) is being implemented in case of data storage
contemplated by the section of 6(2). As the federal manner of constitution, the South African
government has imposed the article 239 so that these cases can be mitigated. Some of the cases
passwords, access codes are being hacked so that they can access personal data for to acquire and
use those documents for the unethical use (Tsikrika et al. 2017). A restricted computer system
must be implemented so that no one can get into the personal data and acquire that. This is a
safety policy imposed by the South African government for mitigating the cyber crime-related
issues. Any individual who contravene the provisions of section 3(1) or (2), 4(1) or (2), 5(1), 6(1)
or 7(1) is predisposed on conviction to a fine or to incarceration for a phase not more than 10
years or to in cooperation a fine and such incarceration. This is being implemented under the
section of 275 Criminal Procedure Act. These policies are important to get control over the
situation as South Africa has become the third highest cybercrime victimized nation. As the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
CYBERCRIME AND IT SECURITY
technological variety and innovativeness has imposed in the modern era of presentation thus with
that process cybercrime has also created a web for the computer and devices.
Cybercrime attack on NHS
The cybercrime affect on NHS had devastated the technological barrier of UK cyber
crime department. All the patient documents had lost and the doctors and surgeons were not
found any evidence from the earlier report (Ganeshkumar, Arivazhagan and Sundaram 2013).
They were not derived the more and that technological vulnerability of situation on that point of
time had made an imperial attack on the NHS. In December it was reported that virtually all
NHS trusts were using an outdated adaptation of Windows for which Microsoft had congested
provided that security updates in April 2014. For that reason, an old system has introduced and
created problems for the hospitals. All those important and relevant data were not found due to
that cybercrime attack.
CYBERCRIME AND IT SECURITY
technological variety and innovativeness has imposed in the modern era of presentation thus with
that process cybercrime has also created a web for the computer and devices.
Cybercrime attack on NHS
The cybercrime affect on NHS had devastated the technological barrier of UK cyber
crime department. All the patient documents had lost and the doctors and surgeons were not
found any evidence from the earlier report (Ganeshkumar, Arivazhagan and Sundaram 2013).
They were not derived the more and that technological vulnerability of situation on that point of
time had made an imperial attack on the NHS. In December it was reported that virtually all
NHS trusts were using an outdated adaptation of Windows for which Microsoft had congested
provided that security updates in April 2014. For that reason, an old system has introduced and
created problems for the hospitals. All those important and relevant data were not found due to
that cybercrime attack.

5
CYBERCRIME AND IT SECURITY
References
Fahey, E., 2014. The EU's cybercrime and cyber-security rulemaking: mapping the internal and
external dimensions of EU security. European Journal of Risk Regulation, 5(1), pp.46-60.
Ganeshkumar, K., Arivazhagan, D. and Sundaram, S., 2013. Strategies of cybercrime: Viruses
and security sphere. J. Acad. Indus. Res, 2(7), pp.397-401.
Grabosky, P., 2015. Organized cybercrime and national security. In Cybercrime Risks and
Responses (pp. 67-80). Palgrave Macmillan UK.
Kshetri, N., 2013. Cybercrime and cyber-security issues associated with China: some economic
and institutional considerations. Electronic Commerce Research, 13(1), pp.41-69.
Smith, R.G., Cheung, R.C.C. and Lau, L.Y.C. eds., 2015. Cybercrime Risks and Responses:
Eastern and Western Perspectives. Springer.
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st International Workshop on Search and Mining Terrorist Online Content &
Advances in Data Science for Cyber Security and Risk on the Web. In Proceedings of the Tenth
ACM International Conference on Web Search and Data Mining (pp. 823-824). ACM.
CYBERCRIME AND IT SECURITY
References
Fahey, E., 2014. The EU's cybercrime and cyber-security rulemaking: mapping the internal and
external dimensions of EU security. European Journal of Risk Regulation, 5(1), pp.46-60.
Ganeshkumar, K., Arivazhagan, D. and Sundaram, S., 2013. Strategies of cybercrime: Viruses
and security sphere. J. Acad. Indus. Res, 2(7), pp.397-401.
Grabosky, P., 2015. Organized cybercrime and national security. In Cybercrime Risks and
Responses (pp. 67-80). Palgrave Macmillan UK.
Kshetri, N., 2013. Cybercrime and cyber-security issues associated with China: some economic
and institutional considerations. Electronic Commerce Research, 13(1), pp.41-69.
Smith, R.G., Cheung, R.C.C. and Lau, L.Y.C. eds., 2015. Cybercrime Risks and Responses:
Eastern and Western Perspectives. Springer.
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017,
February. 1st International Workshop on Search and Mining Terrorist Online Content &
Advances in Data Science for Cyber Security and Risk on the Web. In Proceedings of the Tenth
ACM International Conference on Web Search and Data Mining (pp. 823-824). ACM.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





