7010_Week 6 Discussion
docx
keyboard_arrow_up
School
Strathmore University *
*We aren’t endorsed by this school
Course
7000
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
2
Uploaded by DukeMinkMaster907
1
WEEK 6 DISCUSSION BOARD
Week 6 Discussion Board
Safe havens for cybercrime
Most countries around the world have created national laws widely covering facets of
cybercrime. However, there are what is known as safe havens of cybercrime. The safe havens of
cybercrime refer to the countries that do not have such cybercrime laws because cybercriminals
cannot be prosecuted for cybercriminal activities unless the country consider such activities illicit
and, therefore, punishable by law. The concept of safe havens of cybercrime has been recently
observed in the resident of Philippines who created and distributed “LOVE BUG” computer
virus. The person could not be prosecuted at the time because the country did not have
cybercrime laws (O’Donnell-Welch, 2022).
Cyber espionage
Also known as cyber spying, cyber espionage refers to a form of cyber-attack where
unauthorized users try to access classified data or intellectual data for economic gains or political
and competitive advantage reasons. Today, cyber espionage is increasingly being used for
gathering classified data and different forms of intellectual property. Additionally, there are some
cases where the intention of the breach caused by cyber espionage is to damage reputation of the
victim as it exposes sensitive data and information. Other motivations of cyber espionage are to
gain monetarily. The impact is always disruption of services and destruction of infrastructure
which could also result to loss of life (Baker, 2023).
Malicious tools
Malicious tools refer to malicious programs meant for automatically creating worms,
viruses, or Trojans. Additionally, malicious tools can be used in conducting denial-of-service
(DoS) attacks on remotely placed servers or hacking into other computer systems and devices.
2
WEEK 6 DISCUSSION BOARD
Different from Trojans, viruses, and worms, malware in the malicious tools subclass do not
directly threaten the security of a computer system it is running on. Additionally, the payload of
the program is only delivered when the user directly orders so (Zelleke, 2023).
References
Baker, K. (2023).
What is Cyber Espionage?
https://www.crowdstrike.com/cybersecurity-
101/cyberattacks/cyber-espionage/
O’Donnell-Welch, L. (2022).
Ransomware safe havens, reporting inconsistencies trouble
authorities
.
https://duo.com/decipher/ransomware-safe-havens-reporting-inconsistencies-
trouble-authorities
Zelleke, L. (2023).
The Best Malware Detection & Analysis Tools for Your Network.
https://www.comparitech.com/net-admin/best-malware-detection-and-analysis-tools/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help