7010_Week 6 Discussion

docx

School

Strathmore University *

*We aren’t endorsed by this school

Course

7000

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

2

Uploaded by DukeMinkMaster907

Report
1 WEEK 6 DISCUSSION BOARD Week 6 Discussion Board Safe havens for cybercrime Most countries around the world have created national laws widely covering facets of cybercrime. However, there are what is known as safe havens of cybercrime. The safe havens of cybercrime refer to the countries that do not have such cybercrime laws because cybercriminals cannot be prosecuted for cybercriminal activities unless the country consider such activities illicit and, therefore, punishable by law. The concept of safe havens of cybercrime has been recently observed in the resident of Philippines who created and distributed “LOVE BUG” computer virus. The person could not be prosecuted at the time because the country did not have cybercrime laws (O’Donnell-Welch, 2022). Cyber espionage Also known as cyber spying, cyber espionage refers to a form of cyber-attack where unauthorized users try to access classified data or intellectual data for economic gains or political and competitive advantage reasons. Today, cyber espionage is increasingly being used for gathering classified data and different forms of intellectual property. Additionally, there are some cases where the intention of the breach caused by cyber espionage is to damage reputation of the victim as it exposes sensitive data and information. Other motivations of cyber espionage are to gain monetarily. The impact is always disruption of services and destruction of infrastructure which could also result to loss of life (Baker, 2023). Malicious tools Malicious tools refer to malicious programs meant for automatically creating worms, viruses, or Trojans. Additionally, malicious tools can be used in conducting denial-of-service (DoS) attacks on remotely placed servers or hacking into other computer systems and devices.
2 WEEK 6 DISCUSSION BOARD Different from Trojans, viruses, and worms, malware in the malicious tools subclass do not directly threaten the security of a computer system it is running on. Additionally, the payload of the program is only delivered when the user directly orders so (Zelleke, 2023). References Baker, K. (2023). What is Cyber Espionage? https://www.crowdstrike.com/cybersecurity- 101/cyberattacks/cyber-espionage/ O’Donnell-Welch, L. (2022). Ransomware safe havens, reporting inconsistencies trouble authorities . https://duo.com/decipher/ransomware-safe-havens-reporting-inconsistencies- trouble-authorities Zelleke, L. (2023). The Best Malware Detection & Analysis Tools for Your Network. https://www.comparitech.com/net-admin/best-malware-detection-and-analysis-tools/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help