In: Computer Science
Search online to find an incident of cybercrime (not included in the readings) or create one yourself. Please describe the event and explain which theory from the week’s readings can be used to explain the cybercrime. Why do you think so? Write a 1 to 2 page paper answering these questions. Choose a cybercrime with a real-world example of a cybercrime and use either the routine activities or rational choice theory to examine the facts of the crime.
Cybercrime:
Any criminal that involves a computer or a networked device. Most of the crimes happen in order to generate profit for the cybercriminals and some crimes are against comuputers or directly to damage the data that involves some criminal activities including ransomware attacks, internet fraud, as well as credit/debit card or other payment card information. It is also called "Computer Crime" .
How Cybercrime works:
These attacks begins where there is a digital information or data. Cybercriminals use various attacks and constantly seek new techniques for achieving their goals. They use activities like using malware and other type of software. Phishing emails is another important component for executing most type of crimes but this attack is especially for targeted one's like business email compromise(BEC), in which attackers attempts to impersonate.
We have many types of cybercrimes include the following
Common Real world Examples of cybercrimes:
More commonly seen cybercrime attacks include distributed DoS (DDoS) attacks, which are used to shutdown the systems and networks. These carry some malicious codes or they will be part of cyberextortion.
In orde rto keep the global aviation system smoothly, the industry relies on information and communications technology (ICT) to deliver critical iinformation, empowring the people to work within their networks.
Let us consider airport infrastructure, which supports different operations that are more critical for the efficiency and for the system affectiveness.
In June 2015, one of Poland's airlines, LOT, suggested that operations at its Warsaw Chopin Airport hub were disrupted by what the carrier said was a cyberattack on its flight planning computers. At that time 10 filghts were canceled and other delayed. The reported problem was Distributed Denial of Service (DDoS) attack, where a hacker deluges an organization system with so many communication requests overloads the server, and it can no longer carry its normal functions.
One of the largest known case of computer hacking was discovered in late March 2009, that involves government and private computers in at least 103 countries. The worldwide spy network known as GhostNet was discovered by the researchers at the University of Toronto, who had been asked by representatives of the Dalai Lama to investigate the exiled Tibetan leader's computers for possible malware.Reportedly, the computers were infected by users who opened e-mail attachments or clicked on web page links. Once infected with the GhostNet malware, the computers began "phishing" for files throughout the network. Three control servers that ran the malware located in Hainan, Guangdong and Sichuan provinces in china and the last server was located in California.
How to solve:
The key to solve these kind of problems is first we should accelerate the awareness of the real possibilities of these dangers, then assemble a well orchestrate cybersecurity risk and mitigation strategy for each attribute of public transportation where humans life can be placed in harms way.