SlideShare a Scribd company logo
1 of 7
Echoles 1
Students Name: Antwan Echoles
Professor’s Name: Mr. Welch
Course Title: ENG-111-2905
Date: 15 November 2021
Cybercrime and Its Implications
Cybercrimes are malicious activities conducted by
cybercriminals by using or targeting a computer. Cybercrimes
involve activities like interference of system interceptions and
data that affect networks and systems. Cybercriminals infect
devices with viruses and malware to destroy them or cease them
from operating. Cybercriminals can also use computers to
conduct other crimes that require using systems to spread
malware and unlawful information. Cybercriminals can be
highly skilled using organized and advanced techniques or just
novice hackers (Malby et al.). The main types of cybercrimes
are phishing, malware attacks, distributed Dos attacks, credit
card fraud, ransom ware attacks, internet fraud, identity fraud,
corporate data, and cyber extortion. Cybercrimes are
challenging the world; cybercriminals are advancing on their
techniques and posing significant challenges to peoples'
finances and reputation and extorting businesses.
Cybercrimes over the internet are advancing substantively due
to developments in technology in today's world. They have
forced businesses to get into long-term debts due to online
identity thefts and ransom wares. Companies have had their
files corrupted, activities have been disrupted, and others closed
indefinitely. Computer-based variations like phishing and
ransom ware attacks commonly used by attackers are easy to
conduct because of anonymity, convenience, and internet speed.
Most cybercriminals do not perform the crimes in their
countries; they conduct their activities in countries with frail or
no cybercrime rules to avoid being detected.
Cybercrimes do not occur in a void, they are well planned and
distributed in nature, and some depend on others to perform
their crimes (Ali et al.). Cybercriminals use various attack
aspects to conduct cybercrimes; they seek new systems and
techniques to execute their tasks. The internet has not allowed
cybercriminals to evolve but has enabled them to upgrade their
game; malware kits are available at cheap prices allowing
novices to enter the world of crime.
Cybercrimes have a negative effect on technological
infrastructure because attackers prey on their users for financial
gain. Attackers achieve this by targeting computers and
contaminating them with computer viruses; the viruses are
extended to other networks which target users' confidential
information. Cybercriminals embezzle funds from banks; the
criminals aim at financial organizations to get class security
systems. The attackers also earn cash from ransom; the
attackers look for anorganization that perform majority of its
operations on the internet and takes down their sites; the
company is given a demand to pay a certain amount of money
for their system to get restored. Studies show that in ransom
attacks, coercion claims range between $10 000 to $50 000.
According to Yury Connolly, victims of ransom ware attacks
opt to pay the ransoms to avoid the repercussions of their
websites being taken down.
In their bid to get finances, cybercriminals steal credit cards;
the stolen credit card particulars are then used by the attackers
for their purchases. Attackers use impersonating to make
money; attackers impersonate legitimate sellers and sell fake
and non-existent items. Cybercriminals convince the victims to
buy their counterfeit goods and disappear without delivering the
services and goods(Kyung-shick and Lee). Cybercriminals also
make money through crypto currencies; they use crypto jacking
to get cash at the cost of victims without knowing they are
taking part in the mining process. They use malware to take
control of victims display program and use their computers to
get finances without their comprehension.
Cybercrimes have a negative effect on people, organizations,
and governments because of extorting businesses using
malware; malware is malicious software designs meant to harm
and export any programmable service, network, or device.
Cybercriminals use malware to control computers then launch
denial-of-service attacks, infect PCs, and use them to getcrypto
currencies (Nurse). The main types of malwares are scare ware,
viruses, Trojans, spyware, and fireless malware. For example,
the home depots system was breached using malware; the breach
exposed information and data for over fifty million credit cards.
The attackers installed malware using a vendor's username and
password and assessed the company's system. They positioned
the malware on the organizations system of sales; it meant
anyone who was swiping their credit cards was giving out their
private credentials to the criminals.
Cybercriminals are using malware to extort businesses by
sending it to computers; targeted victims run them without
knowing they are infected. The malware holds back until users
connect to a bank's service; they take over and steal the vital
particulars. The hidden malware lets the victims access their
accounts, do authenticating, and then take over the system
(Nurse). Through the malware, the attackers command transfer
of money into their accounts, they hide the transactions for the
user not to know their actual balance immediately. Internet
users can protect themselves from malware by protecting their
devices, keeping operation systems updated, and being careful
online by avoiding unknown links and being selective in the
sites they visit. They should be keen on the links they download
operating system purchases and perform regular checks on their
computers, bank accounts, and credit cards.
Cybercrime has an adverse impact in the view of the
indispensability of the internet in everyday life, especially on
the loss of reputation due to revealed personal information.
Cybercriminals target standard and prominent people, steal their
documents, and use them to extort people. They send viruses to
the targeted victim's computers and get their credentials; after
that, they analyze all the sensitive information from the
individuals and use it for extortion (Ali et al.). Some might be
required to pay money for their information not to be
publicized. Those who do not pay the required funds have their
sensitive information like health status, conversations, or
sensitive pictures publicized. Despite sending the required
amount of money to save their reputation, some attackers keep
the information to extort them to get finances whenever they do
not have money. Due to the acts, some people get depressed and
traumatized, some are fired from their jobs, and others opt to
commit suicide.
The counterargument on cybercriminals is that most cybercrime
victims do not take enough defenses on cybercrimes. I refute the
claims because cybercriminals are advancing on the strategies
they are using to attack by day. People, organizations, and
governments are taking all the necessary steps to protect
themselves from cybercrimes, but the attackers are a step ahead.
As businesses continue to digitize and people get more
connected to the internet, cybercriminals are looking for more
ways to enter their networks. Despite technology struggling to
stay on top of cybercrimes, cybercriminals are changing
techniques and using all ways to avoid detection.
It is evident cybercrimes are challenging the world,
cybercriminals are advancing their techniques and posing
challenges on people’s finances, and reputation and extorting
businesses. The world is digitizing; although not everyone is a
victim of cybercrimes, eventually, everyone will be at risk.
Technology is advancing, and cybercriminals are enhancing the
techniques they use to get their victims. Cybercriminals are
using the internet to earn money, breach national security
systems, taint people's reputations, cause electrical blackouts
and failure of military equipment. Defense starts with
individuals; being aware of cybercriminals' methods to attack
will give people a strong defense against attacks. Cybercrimes
are not going to be eradicated anytime soon; they are deepening
their roots by day. However, with a combination of security
awareness and advancing technology, cybercriminal threats can
be managed.
Works Cited
ALI, NI, et al. "Cybercrime an emerging challenge for internet
users: An overview." Sindh University Research Journal
(Science Series) 50.3D. 2018: 55-58.
https://www.researchgate.net/publication/333132250_Cybercrim
e_an_emerging_challenge_for_internet_users_An_overview.
Choi, Kyung-shick, and Claire Seungeun Lee. "The present and
future of cybercrime, cyberterrorism, and cybersecurity."
International Journal of Cybersecurity Intelligence &
Cybercrime 1.1. 2018: 14.
https://www.researchgate.net/publication/328433593_The_Prese
nt_and_Future_of_Cybercrime_Cyberterrorism_and_Cybersecur
ity.
Malby, Steven, et al. "Comprehensive study on cybercrime."
United Nations Office on Drugs and Crime, Tech. Rep. 2013.
https://www.unodc.org/documents/organized-
crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_21
0213.pdf
Nurse, Jason RC. "Cybercrime and you: How criminals attack
and the human factors that they seek to exploit." arXiv preprint
arXiv:1811.06624. 2018.
https://www.researchgate.net/publication/328762019_Cybercrim
e_and_You_How_Criminals_Attack_and_the_Human_Factors_T
hat_They_Seek_to_Exploit
Yuryna Connolly, Lena, et al. “An Empirical Study of
Ransomware Attacks on Organizations: An Assessment of
Severity and Salient Factors Affecting Vulnerability.” Journal
of Cybersecurity, vol. 6, no. 1. 2020. Crossref,
doi:10.1093/cybsec/tyaa023.
Module 7: Assignment 1 -- Rethinking Audience Discussion
Board
Assignment Introduction
This assignment is a brainstorming and planning assignment for
your upcoming public piece, which is due later in this module.
For the Public Piece in the next assignment, you will restructure
your argument in order to reach a new audience by composing a
public piece, an argument presented in a medium appropriate for
the public domain. Therefore, your audience for this will be the
general public and not the academic community.
For this assignment, you have the following options to reach the
public:
1. An editorial cartoon that would be published in a newspaper
2. A public service announcement in the form of a
video/commercial (1-2 minutes)
3. A poem or song that reflects thoughts and emotions relevant
to your stance
Your public piece should:
1. Establish a clear audience and purpose.
2. Stand as an authentic, engaging, and polished piece that the
public could consume.
3. Communicate an argument effectively with no gaps in logic
or credibility.
Note: You will NOT create this piece in this discussion board.
The assignment for this week is to engage in a discussion with
peers as you plan and brainstorm your ideas. Your public piece
will be due later in the module.
Discussion Board Assignment Guidelines
Please answer the following prompts on the Discussion Board in
short paragraphs:
1. In a few sentences, what was your argument in the Research
Paper?
2. Outside of the academic community, who would benefit from
hearing this argument? Why?
3. With that audience, how might your argument change? What
would your goal be with that audience?
4. Describe your audience. Discuss their potential biases and
opposition to your argument. How do you overcome this?
5. What do you expect your audience to DO based on your
argument? What is the PURPOSE of this communication with
the audience?
6. What's the best way -- your genre -- to reach this audience?
(Choices: an editorial cartoon, a video or commercial, or a
song/poem.)
7. Once you select the genre, discuss HOW to create that piece
in order to reach the intended audience and purpose.

More Related Content

Similar to Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.

document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
Kirti Temani
 

Similar to Echoles 1Students Name Antwan EcholesProfessor’s Name Mr. (20)

The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat LandscapeExposing Cybercriminals Tactics: Understanding the Threat Landscape
Exposing Cybercriminals Tactics: Understanding the Threat Landscape
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf7 Major Types of Cyber Security Threats.pdf
7 Major Types of Cyber Security Threats.pdf
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 

More from EvonCanales257

this is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docxthis is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docx
EvonCanales257
 
This is a flow chart of an existing project. It should be about .docx
This is a flow chart of an existing project. It should be about .docxThis is a flow chart of an existing project. It should be about .docx
This is a flow chart of an existing project. It should be about .docx
EvonCanales257
 
This is a combined interview and short research paper. You are fir.docx
This is a combined interview and short research paper. You are fir.docxThis is a combined interview and short research paper. You are fir.docx
This is a combined interview and short research paper. You are fir.docx
EvonCanales257
 
This homework is for the outline ONLY of a research paper. The outli.docx
This homework is for the outline ONLY of a research paper. The outli.docxThis homework is for the outline ONLY of a research paper. The outli.docx
This homework is for the outline ONLY of a research paper. The outli.docx
EvonCanales257
 
this homework for reaserch methods class I have choose my topic for .docx
this homework for reaserch methods class I have choose my topic for .docxthis homework for reaserch methods class I have choose my topic for .docx
this homework for reaserch methods class I have choose my topic for .docx
EvonCanales257
 
This is a 2 part assignment. You did the last one now we need to.docx
This is a 2 part assignment. You did the last one now we need to.docxThis is a 2 part assignment. You did the last one now we need to.docx
This is a 2 part assignment. You did the last one now we need to.docx
EvonCanales257
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docx
EvonCanales257
 

More from EvonCanales257 (20)

This is a Team Assignment. I have attached what another student on t.docx
This is a Team Assignment. I have attached what another student on t.docxThis is a Team Assignment. I have attached what another student on t.docx
This is a Team Assignment. I have attached what another student on t.docx
 
this is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docxthis is about databases questions , maybe i miss copy some option D,.docx
this is about databases questions , maybe i miss copy some option D,.docx
 
This is a summary of White Teeth by Zadie Smith, analyze a short pas.docx
This is a summary of White Teeth by Zadie Smith, analyze a short pas.docxThis is a summary of White Teeth by Zadie Smith, analyze a short pas.docx
This is a summary of White Teeth by Zadie Smith, analyze a short pas.docx
 
This is a repetition of the first What Am I assignment, in which yo.docx
This is a repetition of the first What Am I assignment, in which yo.docxThis is a repetition of the first What Am I assignment, in which yo.docx
This is a repetition of the first What Am I assignment, in which yo.docx
 
This is a persuasive presentation on your Communication Audit Report.docx
This is a persuasive presentation on your Communication Audit Report.docxThis is a persuasive presentation on your Communication Audit Report.docx
This is a persuasive presentation on your Communication Audit Report.docx
 
This is a flow chart of an existing project. It should be about .docx
This is a flow chart of an existing project. It should be about .docxThis is a flow chart of an existing project. It should be about .docx
This is a flow chart of an existing project. It should be about .docx
 
This is a history library paper.The library paper should be double.docx
This is a history library paper.The library paper should be double.docxThis is a history library paper.The library paper should be double.docx
This is a history library paper.The library paper should be double.docx
 
This is a Discussion post onlyGlobalization may have.docx
This is a Discussion post onlyGlobalization may have.docxThis is a Discussion post onlyGlobalization may have.docx
This is a Discussion post onlyGlobalization may have.docx
 
This is a criminal justice homeworkThe topic is Actus Reus and Men.docx
This is a criminal justice homeworkThe topic is Actus Reus and Men.docxThis is a criminal justice homeworkThe topic is Actus Reus and Men.docx
This is a criminal justice homeworkThe topic is Actus Reus and Men.docx
 
This is a combined interview and short research paper. You are fir.docx
This is a combined interview and short research paper. You are fir.docxThis is a combined interview and short research paper. You are fir.docx
This is a combined interview and short research paper. You are fir.docx
 
This is a 250 word minimum forum post.  How do different types o.docx
This is a 250 word minimum forum post.  How do different types o.docxThis is a 250 word minimum forum post.  How do different types o.docx
This is a 250 word minimum forum post.  How do different types o.docx
 
This homework is for the outline ONLY of a research paper. The outli.docx
This homework is for the outline ONLY of a research paper. The outli.docxThis homework is for the outline ONLY of a research paper. The outli.docx
This homework is for the outline ONLY of a research paper. The outli.docx
 
this homework for reaserch methods class I have choose my topic for .docx
this homework for reaserch methods class I have choose my topic for .docxthis homework for reaserch methods class I have choose my topic for .docx
this homework for reaserch methods class I have choose my topic for .docx
 
This is a business information System project (at least 3 pages AP.docx
This is a business information System project (at least 3 pages AP.docxThis is a business information System project (at least 3 pages AP.docx
This is a business information System project (at least 3 pages AP.docx
 
This is a 2 part assignment. You did the last one now we need to.docx
This is a 2 part assignment. You did the last one now we need to.docxThis is a 2 part assignment. You did the last one now we need to.docx
This is a 2 part assignment. You did the last one now we need to.docx
 
This hoework assignment course is named Operations Management.The .docx
This hoework assignment course is named Operations Management.The .docxThis hoework assignment course is named Operations Management.The .docx
This hoework assignment course is named Operations Management.The .docx
 
This handout helps explain your class project. Your task is to d.docx
This handout helps explain your class project. Your task is to d.docxThis handout helps explain your class project. Your task is to d.docx
This handout helps explain your class project. Your task is to d.docx
 
This for my reflection paper  1-2 pagesIt is due Friday at midnigh.docx
This for my reflection paper  1-2 pagesIt is due Friday at midnigh.docxThis for my reflection paper  1-2 pagesIt is due Friday at midnigh.docx
This for my reflection paper  1-2 pagesIt is due Friday at midnigh.docx
 
This first briefing should be an introduction to your AOI(Area of In.docx
This first briefing should be an introduction to your AOI(Area of In.docxThis first briefing should be an introduction to your AOI(Area of In.docx
This first briefing should be an introduction to your AOI(Area of In.docx
 
This discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docxThis discussion will allow you to examine several different prev.docx
This discussion will allow you to examine several different prev.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.

  • 1. Echoles 1 Students Name: Antwan Echoles Professor’s Name: Mr. Welch Course Title: ENG-111-2905 Date: 15 November 2021 Cybercrime and Its Implications Cybercrimes are malicious activities conducted by cybercriminals by using or targeting a computer. Cybercrimes involve activities like interference of system interceptions and data that affect networks and systems. Cybercriminals infect devices with viruses and malware to destroy them or cease them from operating. Cybercriminals can also use computers to conduct other crimes that require using systems to spread malware and unlawful information. Cybercriminals can be highly skilled using organized and advanced techniques or just novice hackers (Malby et al.). The main types of cybercrimes are phishing, malware attacks, distributed Dos attacks, credit card fraud, ransom ware attacks, internet fraud, identity fraud, corporate data, and cyber extortion. Cybercrimes are challenging the world; cybercriminals are advancing on their techniques and posing significant challenges to peoples' finances and reputation and extorting businesses. Cybercrimes over the internet are advancing substantively due to developments in technology in today's world. They have forced businesses to get into long-term debts due to online identity thefts and ransom wares. Companies have had their files corrupted, activities have been disrupted, and others closed indefinitely. Computer-based variations like phishing and ransom ware attacks commonly used by attackers are easy to conduct because of anonymity, convenience, and internet speed. Most cybercriminals do not perform the crimes in their countries; they conduct their activities in countries with frail or no cybercrime rules to avoid being detected.
  • 2. Cybercrimes do not occur in a void, they are well planned and distributed in nature, and some depend on others to perform their crimes (Ali et al.). Cybercriminals use various attack aspects to conduct cybercrimes; they seek new systems and techniques to execute their tasks. The internet has not allowed cybercriminals to evolve but has enabled them to upgrade their game; malware kits are available at cheap prices allowing novices to enter the world of crime. Cybercrimes have a negative effect on technological infrastructure because attackers prey on their users for financial gain. Attackers achieve this by targeting computers and contaminating them with computer viruses; the viruses are extended to other networks which target users' confidential information. Cybercriminals embezzle funds from banks; the criminals aim at financial organizations to get class security systems. The attackers also earn cash from ransom; the attackers look for anorganization that perform majority of its operations on the internet and takes down their sites; the company is given a demand to pay a certain amount of money for their system to get restored. Studies show that in ransom attacks, coercion claims range between $10 000 to $50 000. According to Yury Connolly, victims of ransom ware attacks opt to pay the ransoms to avoid the repercussions of their websites being taken down. In their bid to get finances, cybercriminals steal credit cards; the stolen credit card particulars are then used by the attackers for their purchases. Attackers use impersonating to make money; attackers impersonate legitimate sellers and sell fake and non-existent items. Cybercriminals convince the victims to buy their counterfeit goods and disappear without delivering the services and goods(Kyung-shick and Lee). Cybercriminals also make money through crypto currencies; they use crypto jacking to get cash at the cost of victims without knowing they are taking part in the mining process. They use malware to take control of victims display program and use their computers to get finances without their comprehension.
  • 3. Cybercrimes have a negative effect on people, organizations, and governments because of extorting businesses using malware; malware is malicious software designs meant to harm and export any programmable service, network, or device. Cybercriminals use malware to control computers then launch denial-of-service attacks, infect PCs, and use them to getcrypto currencies (Nurse). The main types of malwares are scare ware, viruses, Trojans, spyware, and fireless malware. For example, the home depots system was breached using malware; the breach exposed information and data for over fifty million credit cards. The attackers installed malware using a vendor's username and password and assessed the company's system. They positioned the malware on the organizations system of sales; it meant anyone who was swiping their credit cards was giving out their private credentials to the criminals. Cybercriminals are using malware to extort businesses by sending it to computers; targeted victims run them without knowing they are infected. The malware holds back until users connect to a bank's service; they take over and steal the vital particulars. The hidden malware lets the victims access their accounts, do authenticating, and then take over the system (Nurse). Through the malware, the attackers command transfer of money into their accounts, they hide the transactions for the user not to know their actual balance immediately. Internet users can protect themselves from malware by protecting their devices, keeping operation systems updated, and being careful online by avoiding unknown links and being selective in the sites they visit. They should be keen on the links they download operating system purchases and perform regular checks on their computers, bank accounts, and credit cards. Cybercrime has an adverse impact in the view of the indispensability of the internet in everyday life, especially on the loss of reputation due to revealed personal information. Cybercriminals target standard and prominent people, steal their documents, and use them to extort people. They send viruses to the targeted victim's computers and get their credentials; after
  • 4. that, they analyze all the sensitive information from the individuals and use it for extortion (Ali et al.). Some might be required to pay money for their information not to be publicized. Those who do not pay the required funds have their sensitive information like health status, conversations, or sensitive pictures publicized. Despite sending the required amount of money to save their reputation, some attackers keep the information to extort them to get finances whenever they do not have money. Due to the acts, some people get depressed and traumatized, some are fired from their jobs, and others opt to commit suicide. The counterargument on cybercriminals is that most cybercrime victims do not take enough defenses on cybercrimes. I refute the claims because cybercriminals are advancing on the strategies they are using to attack by day. People, organizations, and governments are taking all the necessary steps to protect themselves from cybercrimes, but the attackers are a step ahead. As businesses continue to digitize and people get more connected to the internet, cybercriminals are looking for more ways to enter their networks. Despite technology struggling to stay on top of cybercrimes, cybercriminals are changing techniques and using all ways to avoid detection. It is evident cybercrimes are challenging the world, cybercriminals are advancing their techniques and posing challenges on people’s finances, and reputation and extorting businesses. The world is digitizing; although not everyone is a victim of cybercrimes, eventually, everyone will be at risk. Technology is advancing, and cybercriminals are enhancing the techniques they use to get their victims. Cybercriminals are using the internet to earn money, breach national security systems, taint people's reputations, cause electrical blackouts and failure of military equipment. Defense starts with individuals; being aware of cybercriminals' methods to attack will give people a strong defense against attacks. Cybercrimes are not going to be eradicated anytime soon; they are deepening their roots by day. However, with a combination of security
  • 5. awareness and advancing technology, cybercriminal threats can be managed. Works Cited ALI, NI, et al. "Cybercrime an emerging challenge for internet users: An overview." Sindh University Research Journal (Science Series) 50.3D. 2018: 55-58. https://www.researchgate.net/publication/333132250_Cybercrim e_an_emerging_challenge_for_internet_users_An_overview. Choi, Kyung-shick, and Claire Seungeun Lee. "The present and future of cybercrime, cyberterrorism, and cybersecurity." International Journal of Cybersecurity Intelligence & Cybercrime 1.1. 2018: 14. https://www.researchgate.net/publication/328433593_The_Prese nt_and_Future_of_Cybercrime_Cyberterrorism_and_Cybersecur ity. Malby, Steven, et al. "Comprehensive study on cybercrime." United Nations Office on Drugs and Crime, Tech. Rep. 2013. https://www.unodc.org/documents/organized- crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_21 0213.pdf Nurse, Jason RC. "Cybercrime and you: How criminals attack and the human factors that they seek to exploit." arXiv preprint
  • 6. arXiv:1811.06624. 2018. https://www.researchgate.net/publication/328762019_Cybercrim e_and_You_How_Criminals_Attack_and_the_Human_Factors_T hat_They_Seek_to_Exploit Yuryna Connolly, Lena, et al. “An Empirical Study of Ransomware Attacks on Organizations: An Assessment of Severity and Salient Factors Affecting Vulnerability.” Journal of Cybersecurity, vol. 6, no. 1. 2020. Crossref, doi:10.1093/cybsec/tyaa023. Module 7: Assignment 1 -- Rethinking Audience Discussion Board Assignment Introduction This assignment is a brainstorming and planning assignment for your upcoming public piece, which is due later in this module. For the Public Piece in the next assignment, you will restructure your argument in order to reach a new audience by composing a public piece, an argument presented in a medium appropriate for the public domain. Therefore, your audience for this will be the general public and not the academic community. For this assignment, you have the following options to reach the public: 1. An editorial cartoon that would be published in a newspaper 2. A public service announcement in the form of a video/commercial (1-2 minutes) 3. A poem or song that reflects thoughts and emotions relevant to your stance Your public piece should: 1. Establish a clear audience and purpose. 2. Stand as an authentic, engaging, and polished piece that the public could consume. 3. Communicate an argument effectively with no gaps in logic or credibility. Note: You will NOT create this piece in this discussion board. The assignment for this week is to engage in a discussion with peers as you plan and brainstorm your ideas. Your public piece
  • 7. will be due later in the module. Discussion Board Assignment Guidelines Please answer the following prompts on the Discussion Board in short paragraphs: 1. In a few sentences, what was your argument in the Research Paper? 2. Outside of the academic community, who would benefit from hearing this argument? Why? 3. With that audience, how might your argument change? What would your goal be with that audience? 4. Describe your audience. Discuss their potential biases and opposition to your argument. How do you overcome this? 5. What do you expect your audience to DO based on your argument? What is the PURPOSE of this communication with the audience? 6. What's the best way -- your genre -- to reach this audience? (Choices: an editorial cartoon, a video or commercial, or a song/poem.) 7. Once you select the genre, discuss HOW to create that piece in order to reach the intended audience and purpose.