Upload - Cybercrime In The Digital Age

docx

School

University of Nebraska, Omaha *

*We aren’t endorsed by this school

Course

CYBR420

Subject

Business

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by HighnessPuppy10806

Report
1 Cybercrime In The Digital Age CYBR 420 Cyber Investigations and Forensics Professor Anthony Geron Tony January 14, 2024
2 Cybercrime In The Digital Age What is Cybercrime? Three Different Examples While technology has brought about significant benefits and greater efficiency across multiple industries, cybercrime is increasingly growing at an unprecedented rate. Organizations and businesses that use pervasive technologies have become potential targets of cyberattacks as the number of internet predators grows at an alarming rate. According to (Curtis & Oxburgh, 2022), cybercrime remains a central issue during this digital age, and it is mostly associated with negative consequences on organizational performance. Sviatun and Goncharuk state that cybercrime entails all illegal activities on network devices, computers, and the Internet(Sviatun et al., 2021). The illicit activities include data stealing and malware spreading on other people's networks and computers. Individuals who engage in cybercrimes aim to commit fraud, steal sensitive data in exchange for money, and disrupt the normal system processes within an organization. Cybercriminals have the intent to compromise the integrity, confidentiality, and availability to gain unauthorized access to such information systems (Curtis & Oxburgh, 2022). Studies indicate that cybercrimes exist in multiple forms, including phishing attacks, ransomware attacks, and identity theft. According to (Sviatun et al., 2021), phishing attacks are illegal activities where cybercriminals use deceptive emails, messages, or websites to trick individuals into providing sensitive information. Such sensitive information can involve personal data and credit card details. Ransomware attacks entail using ransomware software to encrypt the victims' files or the computer system. Evidence shows that ransomware attacks aim to render files and the system inaccessible. As a result, the attacker demands payment in exchange for decrypting the
3 files (Curtis & Oxburgh, 2022). However, the victim may or may not receive the decryption key to open the encrypted files after paying the ransomware. Identity theft is also a notable cybercrime where attackers steal an individual's personal information (Bjelajac & Filipović, 2021). The personal information can be credit card information or bank account details. Identity theft helps criminals commit fraud using multiple techniques, such as hacking into databases or vulnerability exploitation in online systems to acquire sensitive information (Curtis & Oxburgh, 2022). Cybercriminals utilize identity theft to open fraudulent accounts and make illegal transactions alongside other crimes. Thus, cybercrime has a significant negative impact on business operations and business performance. How Does Crime Involving a Digital Device Differ from Traditional Crime? The nature of the digital environment and the tools used differentiate between traditional crime and crime involving digital devices. Perpetrators in digital crime use digital devices, networks, and the internet as the primary attack medium (Bjelajac & Filipović, 2021). As a result, digital crimes can be phishing, malware distribution, and identity theft. On the contrary, traditional crimes occur in the physical world without directly using digital tools. For example, traditional crimes can involve vandalism, assault, or burglary (Horan & Saiedian, 2021). Digital crimes are pervasive since geographical barriers do not limit them. Digital criminals engage their targets from anywhere worldwide without being physically present at the victims' location. Criminals must be available at the crime scene to commit a traditional crime. Digital criminals commit illegal activities while hiding in various digital layers (Horan & Saiedian, 2021). As a result, cybercriminals use anonymity to hide their identity and escape law enforcement radar systems, whereas traditional crime perpetrators are easily identified through biometrics and digital cameras. Digital device crime and traditional crime also differ in the level
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
4 of evidence and forensics. While digital crime leaves a trail that can be examined on computer networks and data logs, traditional crime is physical and leaves evidence such as eyewitnesses and fingerprints (Bjelajac & Filipović, 2021). Thus, traditional crime and digital crime exhibit considerable differences that revolve around their medium of operation, global reach, and anonymity. How Has the Nature of Crime Changed As a Result of Pervasive Technology? Pervasive technology has considerably changed the nature of crime in recent years. New criminal offenses have emerged, and traditional criminal activities have become more complex ones that even challenge law enforcement officers to investigate (Horan & Saiedian, 2021). The pervasive technology has contributed to increased connectivity among individuals, making them more vulnerable to cyberattacks. Criminal activities have proliferated recently as perpetrators use multiple digital tools to conduct phishing and ransomware attacks. Digital financial crimes have also become prevalent with the advent of pervasive technology (Milivojevic & Radulski, 2020). Undeniably, technology has facilitated online fraud, hacking, and identity theft, and this has made crime transcend worldwide. The pervasive technology has also increased incidences of harassment and cyberbullying, where individuals suffer from long- term psychological effects (Milivojevic & Radulski, 2020). However, pervasive technology has also facilitated the tracking of crime activities, both traditional and digital, in multiple ways. Intrusion detection systems have been developed to deter digital crimes, while sophisticated cameras and other digital systems, such as alarms, have been developed to deter traditional crimes(Milivojevic & Radulski, 2020). Therefore, pervasive technology has revolutionized the nature of crime in a negative and positive manner. Which Problems Does Cybercrime Pose to Authorities Seeking to Investigate It?
5 Cybercrime is linked with numerous problems for authorities investigating it to prevent it. Cybercriminals operate from any place around the world, creating jurisdictional issues as authorities seek to determine the appropriate jurisdiction for investigation and prosecution (Milivojevic & Radulski, 2020). As such, the lack of International Corporations may hinder efforts to combat international cybercrime. Cybercrime perpetrators also use anonymity, making it difficult for investigators to investigate and pin them down. New technologies such as anonymous networks and cryptocurrencies add an extra layer of complexity for authorities seeking to investigate them (Horan & Saiedian, 2021). Cybercrimes require cross-border collaboration; hence, the lack of such cooperation may limit authorities from investigating serious cybercrime incidents. Finally, digital evidence is complex; forensic experts are often needed, and acquiring admissible evidence for legal proceedings remains a major challenge (Horan & Saiedian, 2021). Hence, authorities face significant challenges when investigating cybercrime. Conclusion Cybercrimes remain a significant threat to digital systems and present a formidable challenge to businesses and authorities. Technology is rapidly evolving, and more cybercrimes are emerging. International collaboration and the use of advanced digital tools can help combat cybercrimes. Therefore, cybercrimes need International Corporation and limitless efforts to thwart them.
6 References Bjelajac, Ž., & Filipović, A. (2021). Specific characteristics of digital violence and digital crime. Pravo - teorija i praksa , 38 (4), 16–32. https://doi.org/10.5937/ptp2104016b Curtis, J., & Oxburgh, G. (2022). Understanding cybercrime in 'real world' policing and law enforcement. The Police Journal: Theory, Practice and Principles , 96 (4), 573–592. https://doi.org/10.1177/0032258x221107584 Horan, C., & Saiedian, H. (2021). Cyber crime investigation: Landscape, challenges, and future research directions. Journal of Cybersecurity and Privacy , 1 (4), 580–596. https://doi.org/10.3390/jcp1040029 Milivojevic, S., & Radulski, E. (2020). The 'future internet' and crime: Towards a criminology of the internet of things. Current Issues in Criminal Justice , 32 (2), 193–207. https://doi.org/10.1080/10345329.2020.1733452 Sviatun, O. V., Goncharuk, O. V., Roman, C., Kuzmenko, O., & Kozych, I. V. (2021). Combating cybercrime: Economic and legal aspects. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS , 18 , 751–762. https://doi.org/10.37394/23207.2021.18.72
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help