SlideShare a Scribd company logo
1 of 4
CYBERCRIME IN THE BUSINESS WORLD 1
Page 1 of 4
CYBERCRIME IN BUSINESS
D.C. Washington
DeVry University
BUSN-420: Professor Levin
CYBERCRIME IN THE BUSINESS WORLD 1
Page 2 of 4
It isimportantto knowthat Cybercrime isbigbusinessinAmericaandthroughoutthe world.Inasmuch
as a statistical breakdownshowsusthis,we can extrapolate thatthere willremainthatare enamoredof
it. If the “businessof Americaisbusiness”[asCalvinCoolidge sofamouslysaid],then,surelywe should
make it a part of ourbusinessregimentoguardagainstthisplaque thatsoeasilyaffectsourdailymeans
to do commerce usingsovital a tool as the internet. The sadstatisticsare palpable andthe Bureauof
Justice Statistics[BJS] give the following:
In 2005, among 7,818 businesses –
 67% detected at least one cybercrime.
 Nearly 60% detected one or more types of cyber attack.
 11% detected cyber theft.
 24% detected other computer security incidents.
 Most businesses did not report cyber attacks to law enforcement authorities.
 The majority of victimized businesses (86%) detected multiple incidents, with half of
these (43%) detecting 10 or more incidents during the year.
 Approximately 68% of the victims of cyber theft sustained monetary loss of $10,000 or
more. By comparison, 34% of the businesses detecting cyber attacks and 31% of
businesses detecting other computer security incidents lost more than $10,000.
 System downtime lasted between 1 and 24 hours for half of the businesses and more than
24 hours for a third of businesses detecting cyber attacks or other computer security
incidents.
Of course, these were from 8 years ago and gleaned using the NCSS [National Computer
Security Survey] documentation that pertains solely to the United States. As our firm does some
of its’ business abroad, take note that this is not an American phenomenon so much as it is the
result of a human condition. It is ubiquitous. To illustrate this, note the following:
and understand that our 23% of the pie comes from
our lack of preparedness in large measure. This Primer – it is hoped – will proactively deter this.
CYBERCRIME IN THE BUSINESS WORLD 1
Page 3 of 4
Furthermore, FBI statistics indicate that cyber crime statistics show that it is on the rise as can be
show here:
This would serve to illustrate that issues stemming from merchandising payments and outright
fraud involving File Scams are to be avoided [and, thus, deserve our focus]. It is critical that we
think outside of the box that most of us are in by reason of our not being criminal. Many of the
people who do this, do it for a living, are skilled programmers and/or practitioners skilled at
evading detection simply because of ineffective measures being taken to combat this ongoing
issue. The evidence is overwhelming that cyber crime merits our full attention. A December
[2014] survey by the Ponemon Institute [which informs concerning data security issues] showed
“that nearly half of IT security professionals & experts view cyberthieves as their biggest
concern…”
We can do no less. The survey found 92% of respondents suffering some type of cyberattack and
the FTC [Federal Trade Commission] reports that in 2007 there were some 221,226 internet-
related fraud complaints. Of course, we rely to some degree on our online payments so
organized cybercrime via the internet affects us as well.
CYBERCRIME IN THE BUSINESS WORLD 1
Page 4 of 4
Moreover, we should and must be adaptive as well as proactive as the dark hackers in cyberspace
surely are. As illustrated above, our major points of focus should be:
non-delivery of merchandise or non-payment for items sold
FBI-related scams [via emails, text-based phishing schemes etc.]
identity theft
computer-targeting
advance fee fraud
spam
auction fraud
credit card and overpayment fraud.
When, for instance, we routinely send out eBooks and emailings to select customers concerning
sales, markdowns and the like, we need to proactively envision the cyber-criminal salivating at
the opportunity that this routine measure could afford him. Phishing, mock advertisements,
duplicate emails filled with viruses and software Trojans could be there tools to pry into our
business clientele. To counter this, we need to implement the state-of-the-art software suite of
tools that are available to the business sector to provide tracking and combative measures to
detect and stop such efforts.
Referenda:
http://ieeexplore.ieee.org/
www.how2becomeanfbiagent.com
http://www.bjs.gov/index.cfm?ty=tp&tid=41
http://www.sciencedirect.com/science/article/pii/S096525900970057X
http://www.abajournal.com/magazine/article/feds_ready_to_tackle_cybercrime/

More Related Content

What's hot

Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfMoney 2Conf
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceStatewide Insurance Brokers
 
The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault Mimecast
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016 CTM360
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Guy Pearce
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleTwinVasion
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsDavid McHale
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzFitCEO, Inc. (FCI)
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and SecurityPaige Rasid
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 

What's hot (20)

Detecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2ConfDetecting Frauds and Identifying Security Challenge | by Money2Conf
Detecting Frauds and Identifying Security Challenge | by Money2Conf
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
 
IT_Cutter_Publication
IT_Cutter_PublicationIT_Cutter_Publication
IT_Cutter_Publication
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch FizzDark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
Dark Net The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Click Fraud and the Downfall of Google
Click Fraud and the Downfall of GoogleClick Fraud and the Downfall of Google
Click Fraud and the Downfall of Google
 
Why Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen AccountsWhy Your Finance Firm Must Monitor For Stolen Accounts
Why Your Finance Firm Must Monitor For Stolen Accounts
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch FizzThe Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
The Dark Net - The Devil in the Details - Larry Boettger and Michael Horsch Fizz
 
Ppt3 copy
Ppt3  copyPpt3  copy
Ppt3 copy
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 

Similar to CYBERCRIME IN BUSINESS

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by RegulaRegula
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bbmarukanda
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionCBIZ, Inc.
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesPaige Rasid
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersUnited Security Providers AG
 

Similar to CYBERCRIME IN BUSINESS (20)

TME0212-49
TME0212-49TME0212-49
TME0212-49
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula9 Trends in Identity Verification (2023) by Regula
9 Trends in Identity Verification (2023) by Regula
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
BIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special EditionBIZGrowth Strategies - Cybersecurity Special Edition
BIZGrowth Strategies - Cybersecurity Special Edition
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 

CYBERCRIME IN BUSINESS

  • 1. CYBERCRIME IN THE BUSINESS WORLD 1 Page 1 of 4 CYBERCRIME IN BUSINESS D.C. Washington DeVry University BUSN-420: Professor Levin
  • 2. CYBERCRIME IN THE BUSINESS WORLD 1 Page 2 of 4 It isimportantto knowthat Cybercrime isbigbusinessinAmericaandthroughoutthe world.Inasmuch as a statistical breakdownshowsusthis,we can extrapolate thatthere willremainthatare enamoredof it. If the “businessof Americaisbusiness”[asCalvinCoolidge sofamouslysaid],then,surelywe should make it a part of ourbusinessregimentoguardagainstthisplaque thatsoeasilyaffectsourdailymeans to do commerce usingsovital a tool as the internet. The sadstatisticsare palpable andthe Bureauof Justice Statistics[BJS] give the following: In 2005, among 7,818 businesses –  67% detected at least one cybercrime.  Nearly 60% detected one or more types of cyber attack.  11% detected cyber theft.  24% detected other computer security incidents.  Most businesses did not report cyber attacks to law enforcement authorities.  The majority of victimized businesses (86%) detected multiple incidents, with half of these (43%) detecting 10 or more incidents during the year.  Approximately 68% of the victims of cyber theft sustained monetary loss of $10,000 or more. By comparison, 34% of the businesses detecting cyber attacks and 31% of businesses detecting other computer security incidents lost more than $10,000.  System downtime lasted between 1 and 24 hours for half of the businesses and more than 24 hours for a third of businesses detecting cyber attacks or other computer security incidents. Of course, these were from 8 years ago and gleaned using the NCSS [National Computer Security Survey] documentation that pertains solely to the United States. As our firm does some of its’ business abroad, take note that this is not an American phenomenon so much as it is the result of a human condition. It is ubiquitous. To illustrate this, note the following: and understand that our 23% of the pie comes from our lack of preparedness in large measure. This Primer – it is hoped – will proactively deter this.
  • 3. CYBERCRIME IN THE BUSINESS WORLD 1 Page 3 of 4 Furthermore, FBI statistics indicate that cyber crime statistics show that it is on the rise as can be show here: This would serve to illustrate that issues stemming from merchandising payments and outright fraud involving File Scams are to be avoided [and, thus, deserve our focus]. It is critical that we think outside of the box that most of us are in by reason of our not being criminal. Many of the people who do this, do it for a living, are skilled programmers and/or practitioners skilled at evading detection simply because of ineffective measures being taken to combat this ongoing issue. The evidence is overwhelming that cyber crime merits our full attention. A December [2014] survey by the Ponemon Institute [which informs concerning data security issues] showed “that nearly half of IT security professionals & experts view cyberthieves as their biggest concern…” We can do no less. The survey found 92% of respondents suffering some type of cyberattack and the FTC [Federal Trade Commission] reports that in 2007 there were some 221,226 internet- related fraud complaints. Of course, we rely to some degree on our online payments so organized cybercrime via the internet affects us as well.
  • 4. CYBERCRIME IN THE BUSINESS WORLD 1 Page 4 of 4 Moreover, we should and must be adaptive as well as proactive as the dark hackers in cyberspace surely are. As illustrated above, our major points of focus should be: non-delivery of merchandise or non-payment for items sold FBI-related scams [via emails, text-based phishing schemes etc.] identity theft computer-targeting advance fee fraud spam auction fraud credit card and overpayment fraud. When, for instance, we routinely send out eBooks and emailings to select customers concerning sales, markdowns and the like, we need to proactively envision the cyber-criminal salivating at the opportunity that this routine measure could afford him. Phishing, mock advertisements, duplicate emails filled with viruses and software Trojans could be there tools to pry into our business clientele. To counter this, we need to implement the state-of-the-art software suite of tools that are available to the business sector to provide tracking and combative measures to detect and stop such efforts. Referenda: http://ieeexplore.ieee.org/ www.how2becomeanfbiagent.com http://www.bjs.gov/index.cfm?ty=tp&tid=41 http://www.sciencedirect.com/science/article/pii/S096525900970057X http://www.abajournal.com/magazine/article/feds_ready_to_tackle_cybercrime/