Technical Report: Cybercrime Risk Mitigation for the Threats of 2018

Verified

Added on  2023/06/14

|6
|477
|389
Report
AI Summary
This report defines cybercrime and examines emerging threats in 2018, including data breaches, cloud ransomware, AI weaponization, cyber-physical attacks, cryptocurrency mining, and election hacking. It outlines mitigation technologies like firewalls, antivirus software, encryption, cloud computing, and big data analytics to counter these threats. The report emphasizes the importance of securing information systems through proactive measures and provides references to relevant literature. Desklib offers similar solved assignments and past papers for students.
Document Page
Cyber Crime for New
Threats of 2018
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Computer Based Crime
Involved with network and computer
Popular types are hacking, child pornography,
copyright infringement, child grooming and
unwarranted mass surveillance (Dawson 2015).
Committed with the purpose of harming any individual
either mentally or physically.
Committed with the help of mobile phone
technologies like Bluetooth technology, SMS and MMS.
Definition of Cybercrime
(Source: Dawson 2015)
Document Page
Data Breaching: Any type of data is breached. Example: WannaCry
Ransomware
Cloud Ransomware: A type of malware in cloud computing. Example: FedEx
Scam
AI Weaponization: The AI driven arms race is extremely fragile and the hackers
can easily hack them without any complexities (Akhgar, Staniforth and Bosco 2014).
Cyber Physical Attacks: The attackers mainly target the electric grids,
infrastructure, transportation system.
Mining Cryptocurrencies: The digital currencies like Bitcoin are being attacked
by the hackers and the theft to the computer processing power would lead to
major failure. Example: Russian Oil Pipeline Scam.
Hacking Elections: The election system is hacked by the cyber criminals and
they try to do this with the help of new virus or malware. Example: Presidential
election in 2016.
New Threats of 2018
(Source: Akhgar, Staniforth
and Bosco 2014)
Document Page
Firewalls: The firewalls help to detect as well as prevent any type
of threat for securing the information system.
Antivirus: It is the specific type of software that is utilized for the
purpose of preventing any type of virus, malware or hacking.
Encryption: This is the method of encrypting the confidential
information effectively and efficiently. As the information gets
encrypted by any encryption method, it is properly protected and the
hackers do not get a hold of it (Dawson 2015).
Cloud Computing: It is considered as the most secured mode of
data transfer through online. Any type of disaster recovery is
possible with cloud.
Big Data: It is utilized for the purpose of dealing with bulk amount
of data and thus the user can easily uncover all the hidden patterns.
The hackers do not get any hold of the secured data and thus cannot
hack the system.
Mitigation Technologies
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Akhgar, B., Staniforth, A. and Bosco, F.
eds., 2014. Cyber crime and cyber terrorism
investigator's handbook. Syngress.
Dawson, M. ed., 2015. New threats and
countermeasures in digital crime and cyber
terrorism. IGI Global.
References
Document Page
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]