Echoles 1
Students Name: Antwan Echoles
Professor’s Name: Mr. Welch
Course Title: ENG-111-2905
Date: 15 November 2021
Cybercrime and Its Implications
Cybercrimes are malicious activities conducted by cybercriminals by using or targeting a computer. Cybercrimes involve activities like interference of system interceptions and data that affect networks and systems. Cybercriminals infect devices with viruses and malware to destroy them or cease them from operating. Cybercriminals can also use computers to conduct other crimes that require using systems to spread malware and unlawful information. Cybercriminals can be highly skilled using organized and advanced techniques or just novice hackers (Malby et al.). The main types of cybercrimes are phishing, malware attacks, distributed Dos attacks, credit card fraud, ransom ware attacks, internet fraud, identity fraud, corporate data, and cyber extortion. Cybercrimes are challenging the world; cybercriminals are advancing on their techniques and posing significant challenges to peoples' finances and reputation and extorting businesses.
Cybercrimes over the internet are advancing substantively due to developments in technology in today's world. They have forced businesses to get into long-term debts due to online identity thefts and ransom wares. Companies have had their files corrupted, activities have been disrupted, and others closed indefinitely. Computer-based variations like phishing and ransom ware attacks commonly used by attackers are easy to conduct because of anonymity, convenience, and internet speed. Most cybercriminals do not perform the crimes in their countries; they conduct their activities in countries with frail or no cybercrime rules to avoid being detected.
Cybercrimes do not occur in a void, they are well planned and distributed in nature, and some depend on others to perform their crimes (Ali et al.). Cybercriminals use various attack aspects to conduct cybercrimes; they seek new systems and techniques to execute their tasks. The internet has not allowed cybercriminals to evolve but has enabled them to upgrade their game; malware kits are available at cheap prices allowing novices to enter the world of crime.
Cybercrimes have a negative effect on technological infrastructure because attackers prey on their users for financial gain. Attackers achieve this by targeting computers and contaminating them with computer viruses; the viruses are extended to other networks which target users' confidential information. Cybercriminals embezzle funds from banks; the criminals aim at financial organizations to get class security systems. The attackers also earn cash from ransom; the attackers look for anorganization that perform majority of its operations on the internet and takes down their sites; the company is given a demand to pay a certain amount of money for their system to get restored. Studies show that in ransom attacks, coercion claims range between $10 000 to $50 000. According to ...
Echoles 1Students Name Antwan EcholesProfessor’s Name Mr.
1. Echoles 1
Students Name: Antwan Echoles
Professor’s Name: Mr. Welch
Course Title: ENG-111-2905
Date: 15 November 2021
Cybercrime and Its Implications
Cybercrimes are malicious activities conducted by
cybercriminals by using or targeting a computer. Cybercrimes
involve activities like interference of system interceptions and
data that affect networks and systems. Cybercriminals infect
devices with viruses and malware to destroy them or cease them
from operating. Cybercriminals can also use computers to
conduct other crimes that require using systems to spread
malware and unlawful information. Cybercriminals can be
highly skilled using organized and advanced techniques or just
novice hackers (Malby et al.). The main types of cybercrimes
are phishing, malware attacks, distributed Dos attacks, credit
card fraud, ransom ware attacks, internet fraud, identity fraud,
corporate data, and cyber extortion. Cybercrimes are
challenging the world; cybercriminals are advancing on their
techniques and posing significant challenges to peoples'
finances and reputation and extorting businesses.
Cybercrimes over the internet are advancing substantively due
to developments in technology in today's world. They have
forced businesses to get into long-term debts due to online
identity thefts and ransom wares. Companies have had their
files corrupted, activities have been disrupted, and others closed
indefinitely. Computer-based variations like phishing and
ransom ware attacks commonly used by attackers are easy to
conduct because of anonymity, convenience, and internet speed.
Most cybercriminals do not perform the crimes in their
countries; they conduct their activities in countries with frail or
no cybercrime rules to avoid being detected.
2. Cybercrimes do not occur in a void, they are well planned and
distributed in nature, and some depend on others to perform
their crimes (Ali et al.). Cybercriminals use various attack
aspects to conduct cybercrimes; they seek new systems and
techniques to execute their tasks. The internet has not allowed
cybercriminals to evolve but has enabled them to upgrade their
game; malware kits are available at cheap prices allowing
novices to enter the world of crime.
Cybercrimes have a negative effect on technological
infrastructure because attackers prey on their users for financial
gain. Attackers achieve this by targeting computers and
contaminating them with computer viruses; the viruses are
extended to other networks which target users' confidential
information. Cybercriminals embezzle funds from banks; the
criminals aim at financial organizations to get class security
systems. The attackers also earn cash from ransom; the
attackers look for anorganization that perform majority of its
operations on the internet and takes down their sites; the
company is given a demand to pay a certain amount of money
for their system to get restored. Studies show that in ransom
attacks, coercion claims range between $10 000 to $50 000.
According to Yury Connolly, victims of ransom ware attacks
opt to pay the ransoms to avoid the repercussions of their
websites being taken down.
In their bid to get finances, cybercriminals steal credit cards;
the stolen credit card particulars are then used by the attackers
for their purchases. Attackers use impersonating to make
money; attackers impersonate legitimate sellers and sell fake
and non-existent items. Cybercriminals convince the victims to
buy their counterfeit goods and disappear without delivering the
services and goods(Kyung-shick and Lee). Cybercriminals also
make money through crypto currencies; they use crypto jacking
to get cash at the cost of victims without knowing they are
taking part in the mining process. They use malware to take
control of victims display program and use their computers to
get finances without their comprehension.
3. Cybercrimes have a negative effect on people, organizations,
and governments because of extorting businesses using
malware; malware is malicious software designs meant to harm
and export any programmable service, network, or device.
Cybercriminals use malware to control computers then launch
denial-of-service attacks, infect PCs, and use them to getcrypto
currencies (Nurse). The main types of malwares are scare ware,
viruses, Trojans, spyware, and fireless malware. For example,
the home depots system was breached using malware; the breach
exposed information and data for over fifty million credit cards.
The attackers installed malware using a vendor's username and
password and assessed the company's system. They positioned
the malware on the organizations system of sales; it meant
anyone who was swiping their credit cards was giving out their
private credentials to the criminals.
Cybercriminals are using malware to extort businesses by
sending it to computers; targeted victims run them without
knowing they are infected. The malware holds back until users
connect to a bank's service; they take over and steal the vital
particulars. The hidden malware lets the victims access their
accounts, do authenticating, and then take over the system
(Nurse). Through the malware, the attackers command transfer
of money into their accounts, they hide the transactions for the
user not to know their actual balance immediately. Internet
users can protect themselves from malware by protecting their
devices, keeping operation systems updated, and being careful
online by avoiding unknown links and being selective in the
sites they visit. They should be keen on the links they download
operating system purchases and perform regular checks on their
computers, bank accounts, and credit cards.
Cybercrime has an adverse impact in the view of the
indispensability of the internet in everyday life, especially on
the loss of reputation due to revealed personal information.
Cybercriminals target standard and prominent people, steal their
documents, and use them to extort people. They send viruses to
the targeted victim's computers and get their credentials; after
4. that, they analyze all the sensitive information from the
individuals and use it for extortion (Ali et al.). Some might be
required to pay money for their information not to be
publicized. Those who do not pay the required funds have their
sensitive information like health status, conversations, or
sensitive pictures publicized. Despite sending the required
amount of money to save their reputation, some attackers keep
the information to extort them to get finances whenever they do
not have money. Due to the acts, some people get depressed and
traumatized, some are fired from their jobs, and others opt to
commit suicide.
The counterargument on cybercriminals is that most cybercrime
victims do not take enough defenses on cybercrimes. I refute the
claims because cybercriminals are advancing on the strategies
they are using to attack by day. People, organizations, and
governments are taking all the necessary steps to protect
themselves from cybercrimes, but the attackers are a step ahead.
As businesses continue to digitize and people get more
connected to the internet, cybercriminals are looking for more
ways to enter their networks. Despite technology struggling to
stay on top of cybercrimes, cybercriminals are changing
techniques and using all ways to avoid detection.
It is evident cybercrimes are challenging the world,
cybercriminals are advancing their techniques and posing
challenges on people’s finances, and reputation and extorting
businesses. The world is digitizing; although not everyone is a
victim of cybercrimes, eventually, everyone will be at risk.
Technology is advancing, and cybercriminals are enhancing the
techniques they use to get their victims. Cybercriminals are
using the internet to earn money, breach national security
systems, taint people's reputations, cause electrical blackouts
and failure of military equipment. Defense starts with
individuals; being aware of cybercriminals' methods to attack
will give people a strong defense against attacks. Cybercrimes
are not going to be eradicated anytime soon; they are deepening
their roots by day. However, with a combination of security
5. awareness and advancing technology, cybercriminal threats can
be managed.
Works Cited
ALI, NI, et al. "Cybercrime an emerging challenge for internet
users: An overview." Sindh University Research Journal
(Science Series) 50.3D. 2018: 55-58.
https://www.researchgate.net/publication/333132250_Cybercrim
e_an_emerging_challenge_for_internet_users_An_overview.
Choi, Kyung-shick, and Claire Seungeun Lee. "The present and
future of cybercrime, cyberterrorism, and cybersecurity."
International Journal of Cybersecurity Intelligence &
Cybercrime 1.1. 2018: 14.
https://www.researchgate.net/publication/328433593_The_Prese
nt_and_Future_of_Cybercrime_Cyberterrorism_and_Cybersecur
ity.
Malby, Steven, et al. "Comprehensive study on cybercrime."
United Nations Office on Drugs and Crime, Tech. Rep. 2013.
https://www.unodc.org/documents/organized-
crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_21
0213.pdf
Nurse, Jason RC. "Cybercrime and you: How criminals attack
and the human factors that they seek to exploit." arXiv preprint
6. arXiv:1811.06624. 2018.
https://www.researchgate.net/publication/328762019_Cybercrim
e_and_You_How_Criminals_Attack_and_the_Human_Factors_T
hat_They_Seek_to_Exploit
Yuryna Connolly, Lena, et al. “An Empirical Study of
Ransomware Attacks on Organizations: An Assessment of
Severity and Salient Factors Affecting Vulnerability.” Journal
of Cybersecurity, vol. 6, no. 1. 2020. Crossref,
doi:10.1093/cybsec/tyaa023.
Module 7: Assignment 1 -- Rethinking Audience Discussion
Board
Assignment Introduction
This assignment is a brainstorming and planning assignment for
your upcoming public piece, which is due later in this module.
For the Public Piece in the next assignment, you will restructure
your argument in order to reach a new audience by composing a
public piece, an argument presented in a medium appropriate for
the public domain. Therefore, your audience for this will be the
general public and not the academic community.
For this assignment, you have the following options to reach the
public:
1. An editorial cartoon that would be published in a newspaper
2. A public service announcement in the form of a
video/commercial (1-2 minutes)
3. A poem or song that reflects thoughts and emotions relevant
to your stance
Your public piece should:
1. Establish a clear audience and purpose.
2. Stand as an authentic, engaging, and polished piece that the
public could consume.
3. Communicate an argument effectively with no gaps in logic
or credibility.
Note: You will NOT create this piece in this discussion board.
The assignment for this week is to engage in a discussion with
peers as you plan and brainstorm your ideas. Your public piece
7. will be due later in the module.
Discussion Board Assignment Guidelines
Please answer the following prompts on the Discussion Board in
short paragraphs:
1. In a few sentences, what was your argument in the Research
Paper?
2. Outside of the academic community, who would benefit from
hearing this argument? Why?
3. With that audience, how might your argument change? What
would your goal be with that audience?
4. Describe your audience. Discuss their potential biases and
opposition to your argument. How do you overcome this?
5. What do you expect your audience to DO based on your
argument? What is the PURPOSE of this communication with
the audience?
6. What's the best way -- your genre -- to reach this audience?
(Choices: an editorial cartoon, a video or commercial, or a
song/poem.)
7. Once you select the genre, discuss HOW to create that piece
in order to reach the intended audience and purpose.