Question

In: Computer Science

Search online to find an incident of cybercrime (not included in the readings) or create one...

Search online to find an incident of cybercrime (not included in the readings) or create one yourself. Please describe the event and explain which theory from the week’s readings can be used to explain the cybercrime. Why do you think so? Write a 1 to 2 page paper answering these questions. Choose a cybercrime with a real-world example of a cybercrime and use either the routine activities or rational choice theory to examine the facts of the crime.

Solutions

Expert Solution

Cybercrime:

Any criminal that involves a computer or a networked device. Most of the crimes happen in order to generate profit for the cybercriminals and some crimes are against comuputers or directly to damage the data that involves some criminal activities including ransomware attacks, internet fraud, as well as credit/debit card or other payment card information. It is also called "Computer Crime" .

How Cybercrime works:

These attacks begins where there is a digital information or data. Cybercriminals use various attacks and constantly seek new techniques for achieving their goals. They use activities like using malware and other type of software. Phishing emails is another important component for executing most type of crimes but this attack is especially for targeted one's like business email compromise(BEC), in which attackers attempts to impersonate.

We have many types of cybercrimes include the following

  • Identity theft
  • Credit card fraud
  • Cyberextortion

Common Real world Examples of cybercrimes:     

More commonly seen cybercrime attacks include distributed DoS (DDoS) attacks, which are used to shutdown the systems and networks. These carry some malicious codes or they will be part of cyberextortion.  

In orde rto keep the global aviation system smoothly, the industry relies on information and communications technology (ICT) to deliver critical iinformation, empowring the people to work within their networks.

Let us consider airport infrastructure, which supports different operations that are more critical for the efficiency and for the system affectiveness.

In June 2015, one of Poland's airlines, LOT, suggested that operations at its Warsaw Chopin Airport hub were disrupted by what the carrier said was a cyberattack on its flight planning computers. At that time 10 filghts were canceled and other delayed. The reported problem was Distributed Denial of Service (DDoS) attack, where a hacker deluges an organization system with so many communication requests overloads the server, and it can no longer carry its normal functions.

One of the largest known case of computer hacking was discovered in late March 2009, that involves government and private computers in at least 103 countries. The worldwide spy network known as GhostNet was discovered by the researchers at the University of Toronto, who had been asked by representatives of the Dalai Lama to investigate the exiled Tibetan leader's computers for possible malware.Reportedly, the computers were infected by users who opened e-mail attachments or clicked on web page links. Once infected with the GhostNet malware, the computers began "phishing" for files throughout the network. Three control servers that ran the malware located in Hainan, Guangdong and Sichuan provinces in china and the last server was located in California.  

How to solve:

The key to solve these kind of problems is first we should accelerate the awareness of the real possibilities of these dangers, then assemble a well orchestrate cybersecurity risk and mitigation strategy for each attribute of public transportation where humans life can be placed in harms way.


Related Solutions

Search online to find an incident of a cybercrime (not included in the readings). Please describe...
Search online to find an incident of a cybercrime (not included in the readings). Please describe the event. What are the lessons learned? How can these lessons be implemented in the United States? Write a 1 to 2 page paper answering these questions.
search current news to find an article about a company that experienced an accounting fraud incident...
search current news to find an article about a company that experienced an accounting fraud incident in the last three years. Summarize the article and include proper APA citation and reference list as part of your posting. some important focal points: What was the nature of the fraud (occupational or managerial)? Who were the key players? How does the event fit the Fraud Triangle? What was the end result?
Create an Incident Response Plan for your online shopping network company under COVID-19 modes?
Create an Incident Response Plan for your online shopping network company under COVID-19 modes?
Q1. Search online to find an example policy statement and show the five components of a...
Q1. Search online to find an example policy statement and show the five components of a security policy in the statement. Q2. Describe the difference between DAC and MAC policies. Q3. Explain the difference between Black-Box and White-Box testing. Use one specific example for each. Q4. Discuss the advantages and disadvantages of dynamic analysis technique over static analysis techniques. Q5. Explain the two extensions of RBAC model in two separate paragraphs. Discuss the advantage of each one. Q6. What are...
Search the NAU Online Library for one article about Sarbanes Oxley. Search the Business Subject Guide...
Search the NAU Online Library for one article about Sarbanes Oxley. Search the Business Subject Guide or US NewsStream. Read your article in full. Then analyze the Sarbanes-Oxley act by responding to the following questions, in detail, on the discussion board: Why did Congress pass the Sarbanes-Oxley Act? What is the purpose of this legislation? What is the title, author, and source of the article you found about the Sarbanes-Oxley Act? What additional information did you learn about the Sarbanes-Oxley...
Instructions: Search the news, or online articles and sites to find the term “probability” (likelihood, odds,...
Instructions: Search the news, or online articles and sites to find the term “probability” (likelihood, odds, and expected outcome are also acceptable terms rather than “probability”). Locate two examples, one where you believe it is used correctly and one that you think seems fishy. Post your sources as a reference. No need to explain the articles, or how the term is used because that will be done in our response later in this module.
Search online and find the most recent Big Mac Index and make a list of 10...
Search online and find the most recent Big Mac Index and make a list of 10 countries including US. Which currencies are over valued and which under valued (if any)? Provide a possible explanation of why a selected currency is over valued.
Search online and find 1-3 articles that discuss the competition between Target and Walmart. For each...
Search online and find 1-3 articles that discuss the competition between Target and Walmart. For each article: • Identify Provide a link to the article. • Identify which aspects of the article will be helpful as you conduct your SWOT analysis.
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,”...
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,” “Revenue Recognition,” or “Accounting Fraud.” Then please provide the webpage link of the article together with the answers to the following questions. Question 1: How is your article of choice related to topics above and why you think it is interesting? Question 2: What are the practical implications of this article?
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,”...
Please search online business press and find a recent article related to “Accrual versus Cash Accounting,” “Revenue Recognition,” or “Accounting Fraud.” Then please provide the webpage link of the article together with the answers to the following questions. Answer for each question is limited to 120 words , APA style and is peer review. Question 1: How is your article of choice related to topics above and why you think it is interesting?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT