Cyber Crime: Modern Threats and Government Responses (HLS350)
VerifiedAdded on 2021/06/22
|7
|1322
|176
Report
AI Summary
This report, focusing on HLS350, examines the multifaceted issue of everyday cybercrime. It begins with an introduction to cybercrime and modern cybercriminals, drawing insights from a video. The report then delves into the challenges of tracking cybercriminals, including the difficulties in attribution and the strategies employed by cybercriminals to evade detection. It analyzes government strategies for combating cybercrime, including the use of wireless networks and Internet Protocols. The report also discusses the legal problems associated with cybercriminals, such as attribution, extradition, and arrest. Furthermore, the report addresses the dangers of USB keys as tools for cybercrime, highlighting the risks of malware. Finally, the report provides recommendations for protecting individuals and the state from cybercrime, emphasizing the importance of awareness, strict laws, and improved network systems. The report concludes by emphasizing the need for comprehensive measures to minimize the risks associated with cybercrimes, encouraging individuals to avoid sharing confidential data and organizations to provide cybersecurity training.

Running head: EVERYDAY CYBER CRIME
EVERYDAY CYBER CRIME
(ASSIGNMENT 3: HLS350)
EVERYDAY CYBER CRIME
(ASSIGNMENT 3: HLS350)
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
EVERYDAY CYBER CRIME
Table of Contents
Introduction......................................................................................................................................3
A short note on modern cybercriminals as per the video (CLO 1)..................................................3
Tracking down a cybercriminal on the internet (CLO 3)................................................................3
Level of difficulty........................................................................................................................3
Using specific strategies by the government................................................................................4
Legal problems related to cyber criminals (CLO 2)........................................................................4
Attribution....................................................................................................................................4
Extradition....................................................................................................................................4
Arrest............................................................................................................................................4
The dangerousness of the USB key (CLO 4)..................................................................................5
Recommendations (CLO 5).............................................................................................................5
a) Protection of individuals..........................................................................................................5
b) Protection of state....................................................................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................7
EVERYDAY CYBER CRIME
Table of Contents
Introduction......................................................................................................................................3
A short note on modern cybercriminals as per the video (CLO 1)..................................................3
Tracking down a cybercriminal on the internet (CLO 3)................................................................3
Level of difficulty........................................................................................................................3
Using specific strategies by the government................................................................................4
Legal problems related to cyber criminals (CLO 2)........................................................................4
Attribution....................................................................................................................................4
Extradition....................................................................................................................................4
Arrest............................................................................................................................................4
The dangerousness of the USB key (CLO 4)..................................................................................5
Recommendations (CLO 5).............................................................................................................5
a) Protection of individuals..........................................................................................................5
b) Protection of state....................................................................................................................5
Conclusion.......................................................................................................................................5
References........................................................................................................................................7

3
EVERYDAY CYBER CRIME
Introduction
Cybercrimes are defined as the criminal acts that are associated with the internet. In the era of
globalization, criminal activities like cybercrimes are increasing a lot. The study is focused on
cybercrime and how the issue can be dealt with by the government.
A short note on modern cybercriminals as per the video (CLO 1)
In the modern times, the cyber criminals are using the internet for various malicious activities
and spreading the computer virus by using the networks. The network of the governments is also
being hacked by the cyber criminals. According to the video, it has found that the cyber
criminals are very well organized and skilled (Everyday crime and what you can do about it,
2021). There are some individuals who are trying to create self-help videos for setting up the
business. But those types of videos are committing various fraudulent activities.
According to Kirillova et al. (2017), the malicious information utilized by cyber criminals is
considered as cyber warfare. It is also defined as the utilization of the digitalized attacks by
which the information networks of a nation can get damaged. It is also considered as an
integrated approach to terrorism by which the defense force is facing the problem of cyber
warfare. It has been found that the cyber hackers from China are trying to spread malicious
activities to the government websites of the USA for stealing various information.
Tracking down a cybercriminal on the internet (CLO 3)
Level of difficulty
It is important to note that tracking down cybercriminals and addressing cybercrime is a
challenging task. There are various significant strategies used by the cyber criminals to prevent
themselves. It has examined that there are many people who do not want to report such cases,
and therefore it becomes tough to catch those cyber criminals. As opined by Salamatian et al.
(2019), an individual can track down a cybercriminal by analyzing the GPS location while the
malware link is sent to the device. In the developed countries the law enforcement officials can
also use the wireless networks for tracking down cyber criminals.
EVERYDAY CYBER CRIME
Introduction
Cybercrimes are defined as the criminal acts that are associated with the internet. In the era of
globalization, criminal activities like cybercrimes are increasing a lot. The study is focused on
cybercrime and how the issue can be dealt with by the government.
A short note on modern cybercriminals as per the video (CLO 1)
In the modern times, the cyber criminals are using the internet for various malicious activities
and spreading the computer virus by using the networks. The network of the governments is also
being hacked by the cyber criminals. According to the video, it has found that the cyber
criminals are very well organized and skilled (Everyday crime and what you can do about it,
2021). There are some individuals who are trying to create self-help videos for setting up the
business. But those types of videos are committing various fraudulent activities.
According to Kirillova et al. (2017), the malicious information utilized by cyber criminals is
considered as cyber warfare. It is also defined as the utilization of the digitalized attacks by
which the information networks of a nation can get damaged. It is also considered as an
integrated approach to terrorism by which the defense force is facing the problem of cyber
warfare. It has been found that the cyber hackers from China are trying to spread malicious
activities to the government websites of the USA for stealing various information.
Tracking down a cybercriminal on the internet (CLO 3)
Level of difficulty
It is important to note that tracking down cybercriminals and addressing cybercrime is a
challenging task. There are various significant strategies used by the cyber criminals to prevent
themselves. It has examined that there are many people who do not want to report such cases,
and therefore it becomes tough to catch those cyber criminals. As opined by Salamatian et al.
(2019), an individual can track down a cybercriminal by analyzing the GPS location while the
malware link is sent to the device. In the developed countries the law enforcement officials can
also use the wireless networks for tracking down cyber criminals.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
EVERYDAY CYBER CRIME
Using specific strategies by the government
There is a significant chance for the government officials to use the wireless network and
Internet Protocols for identifying the location of the IP address of the cyber criminals (Kirillova
et al. 2017). The cybercrime department officials can use those strategies to find out the cyber
criminals and protect the country from the cybercrimes.
Legal problems related to cyber criminals (CLO 2)
Attribution
It is very problematic while arresting cyber criminals in terms of attribution. The Internet is one
of the significant aspects of our daily lives. There is a high chance that an individual from
another country can target an individual who lives in a different country through the internet and
it commits cybercrime. In most of the cases, the cyber criminals are not getting arrested. As
opined by Salamatian et al. (2019), the laws of a country are bounded within the border of the
country. Therefore, it is not possible to issue an arrest warrant against a cybercriminal who lives
in a different country.
Extradition
According to Almeida et al. (2017), the law enforcement officials of a nation do not want to hand
over the cybercriminal to another country. However, it is necessary for the government of that
guilty country to recognize the cyber criminals from that country. Thus, it is one of the crucial
legal problem associated with cyber criminals.
Arrest
There are many people who do not want to report cybercrime. Thus, the cyber criminals are not
getting arrested. The police officers also face various problems while arresting a cybercriminal
and facing an issue to collect the proper evidence against the cybercriminal (Kirillova et al.
2017). It reduces the chance of arrest of the cybercriminal.
EVERYDAY CYBER CRIME
Using specific strategies by the government
There is a significant chance for the government officials to use the wireless network and
Internet Protocols for identifying the location of the IP address of the cyber criminals (Kirillova
et al. 2017). The cybercrime department officials can use those strategies to find out the cyber
criminals and protect the country from the cybercrimes.
Legal problems related to cyber criminals (CLO 2)
Attribution
It is very problematic while arresting cyber criminals in terms of attribution. The Internet is one
of the significant aspects of our daily lives. There is a high chance that an individual from
another country can target an individual who lives in a different country through the internet and
it commits cybercrime. In most of the cases, the cyber criminals are not getting arrested. As
opined by Salamatian et al. (2019), the laws of a country are bounded within the border of the
country. Therefore, it is not possible to issue an arrest warrant against a cybercriminal who lives
in a different country.
Extradition
According to Almeida et al. (2017), the law enforcement officials of a nation do not want to hand
over the cybercriminal to another country. However, it is necessary for the government of that
guilty country to recognize the cyber criminals from that country. Thus, it is one of the crucial
legal problem associated with cyber criminals.
Arrest
There are many people who do not want to report cybercrime. Thus, the cyber criminals are not
getting arrested. The police officers also face various problems while arresting a cybercriminal
and facing an issue to collect the proper evidence against the cybercriminal (Kirillova et al.
2017). It reduces the chance of arrest of the cybercriminal.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
EVERYDAY CYBER CRIME
The dangerousness of the USB key (CLO 4)
There are various tools used by cybercriminals to conduct cybercrimes. USB is one of the critical
tools where the cyber criminals upload the computer virus and malware by which the entire
organization gets hampered. The malicious USB when uploaded to any computer system then
many information gets stolen by the cyber criminals. According to Martens et al. (2019), the
Stuxnet virus is one of the crucial viruses which spread from the malicious USB key. It can
destroy the system and the programming of a computer.
Recommendations (CLO 5)
a) Protection of individuals
In order to protect the individuals from cybercrimes, the recommendations are as follows:
● Increasing the awareness about cyber security.
● It is necessary for the people to install and update the antivirus software for protecting the
information.
● The individuals are also encouraged to provide unique passwords for protecting the
software.
b) Protection of state
A nation must follow the recommendations including:
● Implementation of a strict law by which cybercrimes can be reduced.
● It is required for the government to pass new regulations for catching the cyber criminals
from another country.
● Improving the internal network system.
Conclusion
Thus, it is necessary for all countries to take proper measures for minimizing the risks of
cybercrimes. The individuals are also required not to share any confidential data. The
organizations can also increase the awareness by providing training to the employees regarding
cybercrimes. Following those recommendations can hinder the threat of cybercrimes effectively.
EVERYDAY CYBER CRIME
The dangerousness of the USB key (CLO 4)
There are various tools used by cybercriminals to conduct cybercrimes. USB is one of the critical
tools where the cyber criminals upload the computer virus and malware by which the entire
organization gets hampered. The malicious USB when uploaded to any computer system then
many information gets stolen by the cyber criminals. According to Martens et al. (2019), the
Stuxnet virus is one of the crucial viruses which spread from the malicious USB key. It can
destroy the system and the programming of a computer.
Recommendations (CLO 5)
a) Protection of individuals
In order to protect the individuals from cybercrimes, the recommendations are as follows:
● Increasing the awareness about cyber security.
● It is necessary for the people to install and update the antivirus software for protecting the
information.
● The individuals are also encouraged to provide unique passwords for protecting the
software.
b) Protection of state
A nation must follow the recommendations including:
● Implementation of a strict law by which cybercrimes can be reduced.
● It is required for the government to pass new regulations for catching the cyber criminals
from another country.
● Improving the internal network system.
Conclusion
Thus, it is necessary for all countries to take proper measures for minimizing the risks of
cybercrimes. The individuals are also required not to share any confidential data. The
organizations can also increase the awareness by providing training to the employees regarding
cybercrimes. Following those recommendations can hinder the threat of cybercrimes effectively.

6
EVERYDAY CYBER CRIME
EVERYDAY CYBER CRIME
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

7
EVERYDAY CYBER CRIME
References
Almeida, V. A., Doneda, D., & de Souza Abreu, J. (2017). Cyberwarfare and digital governance.
IEEE Internet Computing, 21(2), 68-71. Retrieved from
https://www.mitpressjournals.org/doi/full/10.1162/daed_a_01794
Everyday crime and what you can do about it, (2021). [Video]. Retrieved 11 April 2021, from
https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_ab
out_it/transcript#t-515949
Kirillova, E. A., Kurbanov, R. A., Svechnikova, N. V., Zul'Fugarzade, T. E. D., & Zenin, S. S.
(2017). Problems of fighting crimes on the Internet. J. Advanced Res. L. & Econ., 8, 849.
Retrieved from https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/
jarle8§ion=100
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of
the intention towards taking security measures against malware, scams and cybercrime in
general. Computers in Human Behavior, 92, 139-150. Retrieved from
https://www.sciencedirect.com/science/article/pii/S0747563218305375
Salamatian, L., Douzet, F., Limonier, K., & Salamatian, K. (2019). The geopolitics behind the
routes data travels: a case study of Iran. arXiv preprint arXiv:1911.07723. Retrieved from
https://arxiv.org/pdf/1911.07723
EVERYDAY CYBER CRIME
References
Almeida, V. A., Doneda, D., & de Souza Abreu, J. (2017). Cyberwarfare and digital governance.
IEEE Internet Computing, 21(2), 68-71. Retrieved from
https://www.mitpressjournals.org/doi/full/10.1162/daed_a_01794
Everyday crime and what you can do about it, (2021). [Video]. Retrieved 11 April 2021, from
https://www.ted.com/talks/james_lyne_everyday_cybercrime_and_what_you_can_do_ab
out_it/transcript#t-515949
Kirillova, E. A., Kurbanov, R. A., Svechnikova, N. V., Zul'Fugarzade, T. E. D., & Zenin, S. S.
(2017). Problems of fighting crimes on the Internet. J. Advanced Res. L. & Econ., 8, 849.
Retrieved from https://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/
jarle8§ion=100
Martens, M., De Wolf, R., & De Marez, L. (2019). Investigating and comparing the predictors of
the intention towards taking security measures against malware, scams and cybercrime in
general. Computers in Human Behavior, 92, 139-150. Retrieved from
https://www.sciencedirect.com/science/article/pii/S0747563218305375
Salamatian, L., Douzet, F., Limonier, K., & Salamatian, K. (2019). The geopolitics behind the
routes data travels: a case study of Iran. arXiv preprint arXiv:1911.07723. Retrieved from
https://arxiv.org/pdf/1911.07723
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.