SlideShare a Scribd company logo
1 of 23
Running head: FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
Student’s Name
Institution
Date
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that
aims at providing a solution to the cases and nation problems
about the cybercrime and the potential proposed solution to curb
up the challenge. These feasibilities we are identified by
studying various critical factors such as the social effects, legal
issues, technical problems, and the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a
solution to the major problem in society. During the planning
and preparation process, the proposed solution should be tested
and determined if it is feasible to provide the solution or not.
Cybercrime in united states has been a significant problem and
need to be addressed and solution provided to reduce the
cybercrime.
One of the proposed solutions to this major problem is
providing cybersecurity among very individual. This will enable
most of the people to understand and know the importance of
cybersecurity and thus leading to the reduction of the negative
loses that is caused by the cybercrime in society every year.
Another thing that will ensure that the individuals in the nation
are protected from the impact of the cybercrime is educating
them on ways they can protect themselves over the cybercrime
attempts.
This report will majorly focus on looking at the proposed
solution provided and determine if the answers are feasible or
need some changes. The essential aspects that the story will
focus on include the social impact, the economic effect, and
other elements which will be determined if it can provide a
solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to
solve a specific major problem in society, a positive impact is
always the main objective. When the proposed solution is
applied, such as implementing cybersecurity in the daily lives
of the individuals in the society it will bring a lot of positive
impacts on them. For instance, when the cybersecurity is made
the main focus in the in every place, i.e. schools and workplace,
majority of the individuals will be aware of these threats and
ways of preventing them from affecting their daily lives. This
will also reduce the loss that most of the individuals incur due
to the cybercrime and lack of security in their day-to-day
business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring
much social impact to the life of the individuals since it will
educate people about the dynamic changes that occur in uses of
the technology. When this provides a solution to the cybercrime
problem in the society, it will be adopted by every nation, and
thus the cybercrime problem is reduced and making every
country secure and safe from the cybercrime problems.
Economic Effect.
One of the most critical aspects of coming up with the proposed
solution is the economic feasibility impact. The projected
resolution calls for basically a change in lifestyle in the United
States. The cybersecurity needs to be the main part of the
individuals that will make them safe and preventing the
occurrence of cybercrime. The cybersecurity has to be
implemented in the workplace and various institutions to
achieve the required objectives of solving the issue of
cybercrime in society.
The process of implementation has a great financial cost, but
the results brought by the proposed solution will bring much
economical cost since it will reduce the amount that could have
been used to solve the loss and cases caused by the cybercrime
in the society. When the financial loss incurred due to the
cybercrime is compared to the cost of implementing the
solution, there is a significant difference since the proposed
solution implementation saves much money.
Technical and Legal Issues
For every proposed solution, becoming successful in solving the
intended problem, there are several legal and professional issues
to be followed during the process of implementation. To
implement cybersecurity in the workplaces and the institutions,
some legal issues have to be developed for it to be successful.
Also, during the process of implementation of the
cybersecurity, the technical aspects have to be looked at. The
technical issues involve various aspects such as unforeseen
failure of the system in providing the solution for the problem.
The technical issues will also identify the bugs that will prevent
the proposed solution from providing the solution to the major
problem. The proposed solutions seem to be free from the
technical and legal issues, and thus it may provide the required
solution to the major problem of cybercrime in the United
States.
Conclusion
Generally, the proposed solution to the major problem of
Cybercrime in the United States is more feasible. The problem
in achieving the solution is the lack of financial support during
the process of implementation of the proposed solution. If the
proposed solution gets financial support, it requires, and it will
be easy to implement it and bring the required resolution.
However, considering all other criteria measured to determine
the feasibility of the proposed solution, I found that
implementing the solution either caused little to no impact or
had a positive effect, such as the case with Social implications.
From the above observation, if there will be no financial
distress during the implementation process, the proposed
solution will be successful in solving the major problem of
cybersecurity.
References
Statistica Research Department. (Published August 9, 2019).
Spending on Cybersecurity in the United States from 2010 to
2018. Statistica.
Retrieved from
https://www.statista.com/statistics/615450/cybersecurity-
spending-in-the-us/
Clement, J. (Published July 9, 2019). Amount of monetary
damage caused by reported cybercrime to the IC3 from 2001 to
2018. Statistica.
Retrieved from https://www.statista.com/statistics/267132/total-
damage-caused-by-by-cyber-crime-in-the-us/
Bada, M. & Nurse, J. (Accessed February 2020). The Social and
Psychological Impact of
Cyber-Attacks. Emerging Cyber Threats and Cognitive
Vulnerabilities.
Retrieved from
https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf
Help Net Security. (Published February 26, 2015). The business
and social impacts of cybersecurity issues.
Retrieved from
https://www.helpnetsecurity.com/2015/02/26/the-business-and-
social-impacts-of-cyber-security-issues/
Running head: FEASIBILITY REPORT
1
Feasibility Report
Student’s Name
Institution
Date
Running head: FEASIBILITY REPORT 1
Feasibility Report
Student’s Name
Institution
Date
Memo
TO: Manager
FROM:
DATE:
SUBJECT: Adopting Cybersecurity to Combat Cybercrime
This memo is meant for introducing the feasibility report that
aims at providing a solution to the cases and nation problems
about the cybercrime and the potential proposed solution to curb
up the challenge. These feasibilities we are identified by
studying various critical factors such as the social effects, legal
issues, technical problems, and the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
Countering Cybercrime
Student’s Name
Institution
Table of Contents
Memo 1
List of Figures 4
Executive Summary 4
Countering Cybercrime 4
Cybercrime 4
Meaning of Cybercrime 4
Nature of cybercrime 4
Reasons for Increasing Cases of Cybercrimes 5
Cybersecurity 6
An Understanding of Cybersecurity 7
Importance of Cybersecurity 7
Social Impact of Cybersecurity 7
Economic Impact of Cybersecurity 8
Technical and Legal Impacts 8
Cybersecurity Context 8
Conclusion 9
List of Figures
Figure 1: Evolution of Cybercrime
Figure 2: Framework core structure
Executive Summary
As technology continues to undergo evolution, so do the
opportunities and problems it presents. Governments,
organizations, and people are at crossroads as they move from a
society that is entwined with the Internet and web to a world
characterized with automation, Internet of Things, as well as big
data. But as societies run on technology, so are they dependent
on it. But in the same way technology brings opportunities, it
also presents significant threats. It presents an avenue for
cybercrime, cyber attacks, plus industrial espionage. Thus,
protecting technology is of absolute essence. Cybersecurity is
the way to go. It will play a major role of safeguarding
computer systems, programs, as well as networks from digital
attacks. A formidable cybersecurity measure has several layers
of protection spread across devices, programs, data, and
networks that users seek to protect. People, processes, as well
as technologies must complement one another to effectively
defend devices, systems, and programs from cyber threats and
attacks. A cybersecurity framework core structure is another
essential requirement for entities that want to protect
themselves against cyber attacks and threats. It consists of four
elements: function, categories, and subcategories, and
informative references.
Countering Cybercrime
In less than 30 years, the Internet has grown from being a
curiosity to an essential part of modern life for people in the
world. Just as other aspects of globalization, rapid expansion of
Internet has exceeded regulatory capacity. This lack of authority
has created a vacuum for many abuses. The issue is gravitated
by the fact that this technology was developed in a military
system designed to overcome external controls. Even those
championing the Internet’s creative anarchy have realized it can
only reach its full potential if authorities and stakeholders
establish ground rules and vigorously discourage antisocial
behavior. The main concern is how to do this. Various
approaches including educating Internet users on how to protect
themselves against the impact of abuses have been proposed.
This paper proposes cybersecurity as a suitable solution to
combating cybercrime. CybercrimeMeaning of Cybercrime
Cybercrime is used to describe a wide range of criminal
activities or offenses, such as offenses committed against
computer related forgery and fraud, content offenses,
copywriting offenses, and computer data plus systems (Clough,
2015). Thus, cybercrime refers to any crime that happens
online. Cybercriminals normally commit offenses by targeting
computer devices and/or networks. Just as everyone else, they
use the Internet for communication and to collect information,
which has facilitated a significant of organized criminal
activities. According to Kremling and Parker (2017), the
number of cybercrime offenses has increased because
cyberspace offers criminals anonymity as well as the ability to
allow unassociated people from different parts of the world to
network in transactional ways.Nature of cybercrime
In recent years, governments and organizations have
become reliant on technology to establish identities including
documents, biometric indicators, and identification numbers.
The Internet has even emphasized the need to associate people
with data such as codes, personal identification numbers as well
as passwords. Cybercriminals can obtain this information in
various ways, and use such information to steal money and
conduct other offenses via the Internet (Yar & Steinmetz,
2019). Among the various types of attacks used include viruses,
phishing, program exploitations, hacking, password attacks,
Trojans, ransomware, social engineering, and cross-site
scripting (see figure 1).
Viruses are forms of malware designed with the intention
to cause malicious activity on victim devices. Viruses tend to
delete files and prevent crucial programs such as antivirus from
preventing and activating a user from using his or her computer.
Criminals can also run exploiting programs on computers by
using specialized hacking programs to capitalize on weak areas
in a program’s code. In some cases, hackers can also use man in
the middle attack techniques to tap into communications
between two computers. By doing so, a hacker can record the
type of webpages that a user browses and other unencrypted
data (Singer & Friedman, 2014). Identity theft, which is another
common type of cyber threat, occurs when an attacker collects a
victim’s personal information from social media platforms such
as Facebook, Twitter, or Instagram and uses such information to
build a picture of an individual. An attacker can also use such
information to masquerade as the owner of the account and even
access a user’s bank details (Yar & Steinmetz, 2019).
Password attacks arise when an offender uses a hacking
tool or program to enter many passwords into a website in order
to crack a target’s account details as well as to gain access.
Attackers can also do so on a personal computer logon screen.
Spear phishing arises when someone tries to send an email to
his or he target and it is one of the most common types of cyber
threat. The messages are usually designed to convince
prospective targets to provide their personal detail, follow links
to malicious websites, or download a harmful file. Cross site
scripting arises when a hacker decides to send an internet link
to his or her target. The link will take a victim to a vulnerable
site with vulnerable code thereby exploiting a computer Singer
& Friedman, 2014). Trojans are forms of malwares that disguise
themselves as useful programs but cause various types of
malicious effects such as downloading of dangerous programs
or sending of computer files to a hacker. Ransomware is a
malicious program designed to extort money from targets by
blocking access to computer files and system until a victim pays
the ransom. Attackers use social engineering to trick their
targets into revealing sensitive information such as monetary
payment or confidential data. Attackers can combine social
engineering with the other types of threats (Clough, 2015).
Reasons for Increasing Cases of Cybercrimes
There are many reasons why the world may continue to
witness increasing number of organized cyber crimes in the
future. First, many people can easily access cybercrime
technology. United Nations Office on Drugs and Crime (2013)
indicates that people can easily buy software tools that allow
users to overcome password protections online. These tools
allow many people to become cybercrime offenders, including
those without advanced computing knowledge. For instance, the
proprietors of “Mariposa” botnet did not possess advanced
hacking skills (Sinha, Boukhtouta, Belarde & Debbabi, 2010).
Due to peer to peer exchange as well as mirroring techniques, it
is quite challenging to limit the availability of such
technologies (UNODC, 2013). While skilled cybercriminals
would see no need to work for organizations, these tools allow
criminal groups to recruit unskilled skills to work on their
behalf.
The second reason is the changing profile of Internet users.
United Nations Office on Drugs and Crime (2013), for example,
indicates that developing countries had many Internet users than
developed countries in 2005. This implies that the number of
predators would continue to increase if the new users decide to
use the Internet for criminal activities. Since the number of
victims would remain the same, there is no doubt that the
intensity of attacks will grow. Clough (2015) posits that the
Internet has made it easy for predators in developing countries
to target high value victims in developed countries.
New offenders can also use automation to increase the
number of attacks in the world. Today people can use
automation to send out millions of unsolicited spam messages
within a short duration. Yar and Steinmetz (2019) posit that it is
now easy to automate hacking messages by using software tools
to attack numerous computer systems within a short timeframe.
The ability to launch numerous attacks is possible because of
two reasons. First, it allows cybercriminals to hide behind their
keyboards by taking only a small portion of money from many
victims, which reduces the chances of detection. Second, it
enhances criminal strategies that might have been ineffective
because of high rates of failure.
Figure 1: Evolution of Cybercrime
Cybersecurity
Despite the threat of malwares, ransomware, and viruses
since the introduction of computing technology, awareness of
data security and sanctity did not gain much attention until
introduction of the Internet. This is when many computers on
the web offered hackers formidable playground to test their
hacking skills including committing fraud, attacking websites
and stealing data. Combating cybercrime is a multidisciplinary
issue that includes not only hardware and software, but also
policy and people, all of which are aimed at preventing
cybercrime happening or minimizing its effects when it occurs.
This is what amounts to cybersecurity. Mulligan and Schneider
(2011) define cybersecurity as the practice of safeguarding
computer systems, programs, as well as networks from digital
attacks.
However, there is no single strategy that is effective in
combating cyberthreat because cybersecurity is a continuously
evolving and constantly active process. Kremling and Parker
(2017) assert that implementing effective cybersecurity
approaches or measures is challenging today because of the
huge number of devices in use and attackers are growing more
innovative. An Understanding of Cybersecurity
An effective cybersecurity measure has numerous layers of
protection that are spread across devices, programs, data, and
networks that a user intends to keep safe. In organizations,
people, processes, as well as technologies must complement one
another in order to establish a formidable defense from cyber
threats and attacks (Singer & Friedman, 2014). Kremling and
Parker (2017) posit that people must not only understand, but
also comply with data security principles such as strong
passwords, data backing, and being cautious of attachments in
emails. Concerning processes, businesses must establish
frameworks for dealing with attempted as well as successful
cyber attacks. For instance, organizations can use the NIST
cybersecurity framework to learn how to identify attacks,
protects devices, detect and respond to attacks, as well as
recover from successful attacks. Technology provides
businesses and people the computer security tools required to
safeguard themselves from cyber threats and attacks. Three
important entities are worth protecting: networks and the cloud,
endpoint devices such as computers, and smart devices. Some of
the commonly used technologies used to safeguard these entities
include DNS filtering, antivirus software, email security
solutions, and DNS filtering as well as next generation firewalls
(NIST, 2014). Importance of Cybersecurity
In today’s closely connected world, everybody enjoys the
fruits of advanced cyber-defense programs. Mulligan and
Schneider (2011) indicate that at individual level, cybercrime
can lead to identity theft, extortion attempts, and loss of crucial
information. People depend on critical infrastructure such as
power plants, banks, and hospitals. Thus, these organizations
and critical infrastructures must be secured to keep the society
functioning. People also benefit from activities of cyberthreat
professionals and researchers who investigate new as well as
emerging cyberthreats plus cyber attack strategies. Such studies
reveal new vulnerabilities, enhance open source tools, and
educate people on significance of cybersecurity. Social Impact
of Cybersecurity
Implementing cybersecurity to combat cyber threat and
attack will affect people’s day to day activities and lives in a
positive manner. For example, making cybersecurity the
primary focus in significant places such as schools and
organizations will enable many people understand the major
cyber threats and how to prevent them from interfering with
their day to day lives. It will also reduce financial losses that
people incur because of cybercrime as well as lack of security
in their daily business operations. Cybersecurity will also
enable people understand significant technological changes and
dynamics. There is also a possibility that cybersecurity
measures to secure themselves from cybercrime issues (Teoh &
Mahmood, 2017). Economic Impact of Cybersecurity
Cybersecurity will cause significant lifestyle changes
among people. Nonetheless, there is need to make it main aspect
of people’s lives that will secure and safeguard from impacts of
cybercrime. In as much as the process of implementing
cybersecurity measures will involve significant cost, the results
will bring significant economic benefits because it will reduce
the amount of money that organizations would incur to deal
with negative effects of cybercrime. A cost benefit analysis of
implementing cybersecurity measures shows that the proposed
solution would result in significant financial savings for
businesses (Teoh & Mahmood, 2017). Technical and Legal
Impacts
Just as it is for other solutions, it is important to comply
with legal and professional requirements when implementing
cybersecurity measures. Some of the legal issues worth taking
into consideration include data privacy and confidentiality
before implementing this solution to cybercrime. From the
technological perspective, it is important to consider various
issues such as system failure in securing computer devices,
programs, and systems. Technical considerations will also help
in identifying technological bugs that may hinder the proposed
solution from securing devices, programs, and systems from
cyber threat and attack (Tropina & Callanan, 2015).
Cybersecurity Context
Organizations need a cybersecurity framework core
structure in order to protect themselves against cyber attacks
and threats. National Institute of Standards and Technology
(2014) indicates that a framework core does not only describe a
set of activities needed to attain specific cybersecurity
outcomes, but also references guidance examples necessary to
attain the outcomes. The framework core is not a checklist of
significant actions worth performing but presents significant
security outcomes determined by industry as crucial in
managing cyber security risks. It comprises of four elements,
namely: function, categories, and subcategories as well as
informative references as depicted in figure 1.
Figure 2: Framework core structure
Functions
Categories
Subcategories
Informative references
Identify
Protect
Detect
Respond
Recover
Functions tend to organize cybersecurity functions at their
highest level. They include identify, protect, detect, respond, as
well as recover. They help an organization in expressing its
cybersecurity risk management by organizing information,
facilitating risk management decision, addressing risks or
threats, and improving by learning from past activities.
Functions also align with currently existing incident
management and help detect impact of investing in
cybersecurity. Categories refer to subdivisions of function into
cybersecurity outcome groups tied to programming needs as
well as particular activities. Common examples of categories
are asset management, detection processes as well as access
control. Subcategories divide categories into specific technical
and management activity outcomes. They provide set of
outcomes that help in achieving each category’s specific
outcomes. Informative references relate to sections of standards,
practices, as well as guidelines illustrating method to attain
each subcategory’s specific outcomes (NIST, 2014). Conclusion
Around the globe, governments, businesses, and
individuals have lost money, documents, and suffered from
identity theft due to increasing cybercrime activities. Just as
globalization, rapid expansion of Internet has exceeded
regulatory capacity to address the impact of cybercrime, thereby
creating a vacuum for many abuses. People depend on critical
infrastructure and organizations, which must be secured in order
to keep the society functioning. The way forward is to
implement cybersecurity measures. Entities and individuals who
develop cybersecurity framework core structure are in better
positions to They identify and detect cyber attacks, to
effectively respond to such attacks, and to protect as well as
recover their critical data.
References
Clough, J. (2015). Principles of cybercrime (2nd ed.).
Cambridge, England: Cambridge University Press.
Kremling, J., & Parker, A. M. S. (2017). Cyberspace,
cybersecurity, and cybercrime. Thousand Oaks, CA: SAGE
Publications.
Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for
cybersecurity. Daedalus, 140(4), 70-92.
National Institute of Standards and Technology. (2014).
Framework for improving critical infrastructure cybersecurity
(v 1.0). Washington, D.C.: United States Department of
Commerce
Singer, P. W., & Friedman, A. (2014). Cybersecurity and
cyberwar: What everyone needs to know. New York, NY:
Oxford University Press.
Sinha, P., Boukhtouta, A., Belarde, V. H., & Debbabi, M.
(2010, October). Insights from the analysis of the Mariposa
botnet. In 2010 Fifth International Conference on Risks and
Security of Internet and Systems (CRiSIS) (pp. 1-9). IEEE.
Teoh, C. S., & Mahmood, A. K. (2017, July). National cyber
security strategies for digital economy. In 2017 International
Conference on Research and Innovation in Information
Systems (ICRIIS) (pp. 1-6). IEEE.
Tropina, T., & Callanan, C. (2015). Self-and co-regulation in
cybercrime, cybersecurity and national security. Heidelberg,
Germany: Springer.
United Nations Office on Drugs and Crime. (2013).
Comprehensive study on cybercrime. New York, NY: United
Nations
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society
(3rd ed.). Thousand Oaks, CA: SAGE Publications Limited.
M
emo
TO:
Manager
FROM:
DATE:
SUBJECT:
Adopting Cybersecurity to Combat Cybercrime
This memo is meant for introducing the feasibility report that
aims at providing a solution
to the cases and nation problems about the cybercrime and the
potential proposed
solution to
curb up the challenge. These feasibilities we are identified by
studying various critical factors
such as the social effects, legal issues, technical problems, and
the economic impact. Therefore,
this memo is very vital for an individual to rea
d and understand various aspects.
Memo
TO: Manager
FROM:
DATE:
SUBJECT: Adopting Cybersecurity to Combat Cybercrime
This memo is meant for introducing the feasibility report that
aims at providing a solution
to the cases and nation problems about the cybercrime and the
potential proposed solution to
curb up the challenge. These feasibilities we are identified by
studying various critical factors
such as the social effects, legal issues, technical problems, and
the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
create a 2-3 page report defining your problem. It must include
the following:
· A title page
· Headings that indicate major sections
(INTRODUCTION, DISCUSSION, CONCLUSION) and
subsections (such as Statement of Purpose, Background, and
anything relevant to your particular topic; for example,
Childcare issues and productivity)
· Formal language
· Research
FEASIBILITY REPORT 1
FEASIBILITY REPORT 6
Feasibility Report
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that
aims at providing a solution to the cases and nation problems
about the cybercrime and the potential proposed solution to curb
up the challenge. These feasibilities we are identified by
studying various critical factors such as the social effects, legal
issues, technical problems, and the economic impact. Therefore,
this memo is very vital for an individual to read and understand
various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a
solution to the major problem in society. During the planning
and preparation process, the proposed solution should be tested
and determined if it is feasible to provide the solution or not.
Cybercrime in united states has been a significant problem and
need to be addressed and solution provided to reduce the
cybercrime.
One of the proposed solutions to this major problem is
providing cybersecurity among very individual. This will enable
most of the people to understand and know the importance of
cybersecurity and thus leading to the reduction of the negative
loses that is caused by the cybercrime in society every year.
Another thing that will ensure that the individuals in the nation
are protected from the impact of the cybercrime is educating
them on ways they can protect themselves over the cybercrime
attempts.
This report will majorly focus on looking at the proposed
solution provided and determine if the answers are feasible or
need some changes. The essential aspects that the story will
focus on include the social impact, the economic effect, and
other elements which will be determined if it can provide a
solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to
solve a specific major problem in society, a positive impact is
always the main objective. When the proposed solution is
applied, such as implementing cybersecurity in the daily lives
of the individuals in the society it will bring a lot of positive
impacts on them. For instance, when the cybersecurity is made
the main focus in the in every place, i.e. schools and workplace,
majority of the individuals will be aware of these threats and
ways of preventing them from affecting their daily lives. This
will also reduce the loss that most of the individuals incur due
to the cybercrime and lack of security in their day-to-day
business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring
much social impact to the life of the individuals since it will
educate people about the dynamic changes that occur in uses of
the technology. When this provides a solution to the cybercrime
problem in the society, it will be adopted by every nation, and
thus the cybercrime problem is reduced and making every
country secure and safe from the cybercrime problems.
Economic Effect.
One of the most critical aspects of coming up with the proposed
solution is the economic feasibility impact. The projected
resolution calls for basically a change in lifestyle in the United
States. The cybersecurity needs to be the main part of the
individuals that will make them safe and preventing the
occurrence of cybercrime. The cybersecurity has to be
implemented in the workplace and various institutions to
achieve the required objectives of solving the issue of
cybercrime in society.
The process of implementation has a great financial cost, but
the results brought by the proposed solution will bring much
economical cost since it will reduce the amount that could have
been used to solve the loss and cases caused by the cybercrime
in the society. When the financial loss incurred due to the
cybercrime is compared to the cost of implementing the
solution, there is a significant difference since the proposed
solution implementation saves much money.
Technical and Legal Issues
For every proposed solution, becoming successful in solving the
intended problem, there are several legal and professional issues
to be followed during the process of implementation. To
implement cybersecurity in the workplaces and the institutions,
some legal issues have to be developed for it to be successful.
Also, during the process of implementation of the
cybersecurity, the technical aspects have to be looked at. The
technical issues involve various aspects such as unforeseen
failure of the system in providing the solution for the problem.
The technical issues will also identify the bugs that will prevent
the proposed solution from providing the solution to the major
problem. The proposed solutions seem to be free from the
technical and legal issues, and thus it may provide the required
solution to the major problem of cybercrime in the United
States.
Conclusion
Generally, the proposed solution to the major problem of
Cybercrime in the United States is more feasible. The problem
in achieving the solution is the lack of financial support during
the process of implementation of the proposed solution. If the
proposed solution gets financial support, it requires, and it will
be easy to implement it and bring the required resolution.
However, considering all other criteria measured to determine
the feasibility of the proposed solution, I found that
implementing the solution either caused little to no impact or
had a positive effect, such as the case with Social implications.
From the above observation, if there will be no financial
distress during the implementation process, the proposed
solution will be successful in solving the major problem of
cybersecurity.
References
Statistica Research Department. (Published August 9, 2019).
Spending on Cybersecurity in the United States from 2010 to
2018. Statistica.
Retrieved from
https://www.statista.com/statistics/615450/cybersecurity-
spending-in-the-us/
Clement, J. (Published July 9, 2019). Amount of monetary
damage caused by reported cybercrime to the IC3 from 2001 to
2018. Statistica.
Retrieved from https://www.statista.com/statistics/267132/total-
damage-caused-by-by-cyber-crime-in-the-us/
Bada, M. & Nurse, J. (Accessed February 2020). The Social and
Psychological Impact of
Cyber-Attacks. Emerging Cyber Threats and Cognitive
Vulnerabilities.
Retrieved from
https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf
Help Net Security. (Published February 26, 2015). The business
and social impacts of cybersecurity issues.
Retrieved from
https://www.helpnetsecurity.com/2015/02/26/the-business-and-
social-impacts-of-cyber-security-issues/

More Related Content

Similar to Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx

1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docxjackiewalcutt
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewEnow Eyong
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Silvia Cardona
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxduketjoy27252
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...RAKESH RANA
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperMicrosoft
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks ESADE
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...balejandre
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxbenjaminjames21681
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxBHANU281672
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docxlorainedeserre
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfHumphrey Humphrey
 

Similar to Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx (20)

1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx1. Sean WroteThe first and most critical success factor is effe.docx
1. Sean WroteThe first and most critical success factor is effe.docx
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
The meaning of security in the 21st century
The meaning of security in the 21st centuryThe meaning of security in the 21st century
The meaning of security in the 21st century
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
On the Role of Cross-Disciplinary Research and SSE in Addressing the Challeng...
 
Cyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaperCyber Security Conference - Msps cybersecurity whitepaper
Cyber Security Conference - Msps cybersecurity whitepaper
 
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks  REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
REPORT Risk Nexus - Global Cyber Governance: Preparing for New Business Risks
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 
White paper cyber risk appetite defining and understanding risk in the moder...
White paper cyber risk appetite  defining and understanding risk in the moder...White paper cyber risk appetite  defining and understanding risk in the moder...
White paper cyber risk appetite defining and understanding risk in the moder...
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
2Running head PUBLIC SAFETY ADMINISTRATORS 2PUBLIC SAFETY A.docx
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Module 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdfModule 2 - Cybersecurity On the Defense.pdf
Module 2 - Cybersecurity On the Defense.pdf
 

More from wlynn1

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docxwlynn1
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxwlynn1
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxwlynn1
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxwlynn1
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docxwlynn1
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxwlynn1
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxwlynn1
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxwlynn1
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docxwlynn1
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docxwlynn1
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docxwlynn1
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docxwlynn1
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxwlynn1
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxwlynn1
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxwlynn1
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxwlynn1
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxwlynn1
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxwlynn1
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxwlynn1
 

More from wlynn1 (20)

Running head MARKETING ANALYSIS ASSIGNMENTS .docx
Running head MARKETING ANALYSIS ASSIGNMENTS                      .docxRunning head MARKETING ANALYSIS ASSIGNMENTS                      .docx
Running head MARKETING ANALYSIS ASSIGNMENTS .docx
 
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docxRunning head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
Running head MANAGING A DIVERSE WORKFORCE1MANAGING A DIVERSE.docx
 
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docxRunning head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
Running head MANAGING TECHNOLOGICAL INNOVATION IN DIGITAL BUS.docx
 
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docxRunning head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
Running head MANAGERIAL REPORT FOR SUPERVISING MANAGER 1MAN.docx
 
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docxRunning head MANAGING DYNAMIC ENVIRONMENTS FINAL         .docx
Running head MANAGING DYNAMIC ENVIRONMENTS FINAL .docx
 
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docxRunning head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
Running head MANAGING DONUT FRANCHISES1MANAGING DONUT FRANCHIS.docx
 
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docxRunning head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
Running head MANAGEMENT DILEMMAS1MANAGEMENT DILEMMAS6.docx
 
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docxRunning head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
Running head MANAGERIAL ACCOUNTING 1MANAGERIAL ACCOUNTING.docx
 
Running head LOGISTIC REGRESSION .docx
Running head LOGISTIC REGRESSION                                 .docxRunning head LOGISTIC REGRESSION                                 .docx
Running head LOGISTIC REGRESSION .docx
 
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docxRunning head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO  .docx
Running head MANAGEMENT OF CONGESTIVE HEART FAILURE THROUGH MO .docx
 
Running head MALWARE .docx
Running head MALWARE                                             .docxRunning head MALWARE                                             .docx
Running head MALWARE .docx
 
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docxRunning head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON     .docx
Running head LOS ANGELES AND NEW YORK BUDGETARY COMPARISON .docx
 
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docxRunning head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
Running head MAJOR PROJECT1MAJOR PROJECT9Initial Ou.docx
 
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docxRunning Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
Running Head MAJOR CONCERNS OF CLIMATE CHANGE IN CHINA 1MAJO.docx
 
Running Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docxRunning Head LOGISTICS1Running Head LOGISTICS7.docx
Running Head LOGISTICS1Running Head LOGISTICS7.docx
 
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docxRunning head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
Running head LOGIC MODELLOGIC MODEL 2Logic modelStu.docx
 
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docxRunning head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
Running head LITERATURE REVIEW1MINORITY BOYS SCHOOL DROPOUT A.docx
 
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docxRunning head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
Running head LIVING WITH CHRONIC ILLNESS1Living with Chroni.docx
 
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docxRunning Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
Running Head LITERATURE REVIEW2LITERATURE REVIEW 2.docx
 
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docxRunning head LOGIC MODELLOGIC MODEL 4Situ.docx
Running head LOGIC MODELLOGIC MODEL 4Situ.docx
 

Recently uploaded

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 

Recently uploaded (20)

Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 

Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx

  • 1. Running head: FEASIBILITY REPORT 1 FEASIBILITY REPORT 6 Feasibility Report Student’s Name Institution Date MEMO TO: Manager FROM: DATE: SUBJECT: This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
  • 2. Feasibility Report It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime. One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts. This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem. The Social Impact When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is
  • 3. applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015). When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every country secure and safe from the cybercrime problems. Economic Effect. One of the most critical aspects of coming up with the proposed solution is the economic feasibility impact. The projected resolution calls for basically a change in lifestyle in the United States. The cybersecurity needs to be the main part of the individuals that will make them safe and preventing the occurrence of cybercrime. The cybersecurity has to be implemented in the workplace and various institutions to achieve the required objectives of solving the issue of cybercrime in society. The process of implementation has a great financial cost, but the results brought by the proposed solution will bring much economical cost since it will reduce the amount that could have been used to solve the loss and cases caused by the cybercrime in the society. When the financial loss incurred due to the cybercrime is compared to the cost of implementing the solution, there is a significant difference since the proposed solution implementation saves much money.
  • 4. Technical and Legal Issues For every proposed solution, becoming successful in solving the intended problem, there are several legal and professional issues to be followed during the process of implementation. To implement cybersecurity in the workplaces and the institutions, some legal issues have to be developed for it to be successful. Also, during the process of implementation of the cybersecurity, the technical aspects have to be looked at. The technical issues involve various aspects such as unforeseen failure of the system in providing the solution for the problem. The technical issues will also identify the bugs that will prevent the proposed solution from providing the solution to the major problem. The proposed solutions seem to be free from the technical and legal issues, and thus it may provide the required solution to the major problem of cybercrime in the United States. Conclusion Generally, the proposed solution to the major problem of Cybercrime in the United States is more feasible. The problem in achieving the solution is the lack of financial support during the process of implementation of the proposed solution. If the proposed solution gets financial support, it requires, and it will be easy to implement it and bring the required resolution. However, considering all other criteria measured to determine the feasibility of the proposed solution, I found that implementing the solution either caused little to no impact or had a positive effect, such as the case with Social implications. From the above observation, if there will be no financial distress during the implementation process, the proposed solution will be successful in solving the major problem of cybersecurity. References Statistica Research Department. (Published August 9, 2019). Spending on Cybersecurity in the United States from 2010 to
  • 5. 2018. Statistica. Retrieved from https://www.statista.com/statistics/615450/cybersecurity- spending-in-the-us/ Clement, J. (Published July 9, 2019). Amount of monetary damage caused by reported cybercrime to the IC3 from 2001 to 2018. Statistica. Retrieved from https://www.statista.com/statistics/267132/total- damage-caused-by-by-cyber-crime-in-the-us/ Bada, M. & Nurse, J. (Accessed February 2020). The Social and Psychological Impact of Cyber-Attacks. Emerging Cyber Threats and Cognitive Vulnerabilities. Retrieved from https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf Help Net Security. (Published February 26, 2015). The business and social impacts of cybersecurity issues. Retrieved from https://www.helpnetsecurity.com/2015/02/26/the-business-and- social-impacts-of-cyber-security-issues/ Running head: FEASIBILITY REPORT 1 Feasibility Report
  • 6. Student’s Name Institution Date Running head: FEASIBILITY REPORT 1 Feasibility Report Student’s Name Institution Date Memo TO: Manager FROM: DATE: SUBJECT: Adopting Cybersecurity to Combat Cybercrime This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore,
  • 7. this memo is very vital for an individual to read and understand various aspects. Countering Cybercrime Student’s Name Institution Table of Contents Memo 1 List of Figures 4 Executive Summary 4 Countering Cybercrime 4 Cybercrime 4 Meaning of Cybercrime 4 Nature of cybercrime 4 Reasons for Increasing Cases of Cybercrimes 5 Cybersecurity 6 An Understanding of Cybersecurity 7 Importance of Cybersecurity 7 Social Impact of Cybersecurity 7 Economic Impact of Cybersecurity 8 Technical and Legal Impacts 8 Cybersecurity Context 8 Conclusion 9 List of Figures Figure 1: Evolution of Cybercrime Figure 2: Framework core structure Executive Summary As technology continues to undergo evolution, so do the opportunities and problems it presents. Governments, organizations, and people are at crossroads as they move from a society that is entwined with the Internet and web to a world characterized with automation, Internet of Things, as well as big
  • 8. data. But as societies run on technology, so are they dependent on it. But in the same way technology brings opportunities, it also presents significant threats. It presents an avenue for cybercrime, cyber attacks, plus industrial espionage. Thus, protecting technology is of absolute essence. Cybersecurity is the way to go. It will play a major role of safeguarding computer systems, programs, as well as networks from digital attacks. A formidable cybersecurity measure has several layers of protection spread across devices, programs, data, and networks that users seek to protect. People, processes, as well as technologies must complement one another to effectively defend devices, systems, and programs from cyber threats and attacks. A cybersecurity framework core structure is another essential requirement for entities that want to protect themselves against cyber attacks and threats. It consists of four elements: function, categories, and subcategories, and informative references. Countering Cybercrime In less than 30 years, the Internet has grown from being a curiosity to an essential part of modern life for people in the world. Just as other aspects of globalization, rapid expansion of Internet has exceeded regulatory capacity. This lack of authority has created a vacuum for many abuses. The issue is gravitated by the fact that this technology was developed in a military system designed to overcome external controls. Even those championing the Internet’s creative anarchy have realized it can only reach its full potential if authorities and stakeholders establish ground rules and vigorously discourage antisocial behavior. The main concern is how to do this. Various approaches including educating Internet users on how to protect themselves against the impact of abuses have been proposed. This paper proposes cybersecurity as a suitable solution to combating cybercrime. CybercrimeMeaning of Cybercrime Cybercrime is used to describe a wide range of criminal activities or offenses, such as offenses committed against
  • 9. computer related forgery and fraud, content offenses, copywriting offenses, and computer data plus systems (Clough, 2015). Thus, cybercrime refers to any crime that happens online. Cybercriminals normally commit offenses by targeting computer devices and/or networks. Just as everyone else, they use the Internet for communication and to collect information, which has facilitated a significant of organized criminal activities. According to Kremling and Parker (2017), the number of cybercrime offenses has increased because cyberspace offers criminals anonymity as well as the ability to allow unassociated people from different parts of the world to network in transactional ways.Nature of cybercrime In recent years, governments and organizations have become reliant on technology to establish identities including documents, biometric indicators, and identification numbers. The Internet has even emphasized the need to associate people with data such as codes, personal identification numbers as well as passwords. Cybercriminals can obtain this information in various ways, and use such information to steal money and conduct other offenses via the Internet (Yar & Steinmetz, 2019). Among the various types of attacks used include viruses, phishing, program exploitations, hacking, password attacks, Trojans, ransomware, social engineering, and cross-site scripting (see figure 1). Viruses are forms of malware designed with the intention to cause malicious activity on victim devices. Viruses tend to delete files and prevent crucial programs such as antivirus from preventing and activating a user from using his or her computer. Criminals can also run exploiting programs on computers by using specialized hacking programs to capitalize on weak areas in a program’s code. In some cases, hackers can also use man in the middle attack techniques to tap into communications between two computers. By doing so, a hacker can record the type of webpages that a user browses and other unencrypted data (Singer & Friedman, 2014). Identity theft, which is another common type of cyber threat, occurs when an attacker collects a
  • 10. victim’s personal information from social media platforms such as Facebook, Twitter, or Instagram and uses such information to build a picture of an individual. An attacker can also use such information to masquerade as the owner of the account and even access a user’s bank details (Yar & Steinmetz, 2019). Password attacks arise when an offender uses a hacking tool or program to enter many passwords into a website in order to crack a target’s account details as well as to gain access. Attackers can also do so on a personal computer logon screen. Spear phishing arises when someone tries to send an email to his or he target and it is one of the most common types of cyber threat. The messages are usually designed to convince prospective targets to provide their personal detail, follow links to malicious websites, or download a harmful file. Cross site scripting arises when a hacker decides to send an internet link to his or her target. The link will take a victim to a vulnerable site with vulnerable code thereby exploiting a computer Singer & Friedman, 2014). Trojans are forms of malwares that disguise themselves as useful programs but cause various types of malicious effects such as downloading of dangerous programs or sending of computer files to a hacker. Ransomware is a malicious program designed to extort money from targets by blocking access to computer files and system until a victim pays the ransom. Attackers use social engineering to trick their targets into revealing sensitive information such as monetary payment or confidential data. Attackers can combine social engineering with the other types of threats (Clough, 2015). Reasons for Increasing Cases of Cybercrimes There are many reasons why the world may continue to witness increasing number of organized cyber crimes in the future. First, many people can easily access cybercrime technology. United Nations Office on Drugs and Crime (2013) indicates that people can easily buy software tools that allow users to overcome password protections online. These tools allow many people to become cybercrime offenders, including those without advanced computing knowledge. For instance, the
  • 11. proprietors of “Mariposa” botnet did not possess advanced hacking skills (Sinha, Boukhtouta, Belarde & Debbabi, 2010). Due to peer to peer exchange as well as mirroring techniques, it is quite challenging to limit the availability of such technologies (UNODC, 2013). While skilled cybercriminals would see no need to work for organizations, these tools allow criminal groups to recruit unskilled skills to work on their behalf. The second reason is the changing profile of Internet users. United Nations Office on Drugs and Crime (2013), for example, indicates that developing countries had many Internet users than developed countries in 2005. This implies that the number of predators would continue to increase if the new users decide to use the Internet for criminal activities. Since the number of victims would remain the same, there is no doubt that the intensity of attacks will grow. Clough (2015) posits that the Internet has made it easy for predators in developing countries to target high value victims in developed countries. New offenders can also use automation to increase the number of attacks in the world. Today people can use automation to send out millions of unsolicited spam messages within a short duration. Yar and Steinmetz (2019) posit that it is now easy to automate hacking messages by using software tools to attack numerous computer systems within a short timeframe. The ability to launch numerous attacks is possible because of two reasons. First, it allows cybercriminals to hide behind their keyboards by taking only a small portion of money from many victims, which reduces the chances of detection. Second, it enhances criminal strategies that might have been ineffective because of high rates of failure. Figure 1: Evolution of Cybercrime Cybersecurity Despite the threat of malwares, ransomware, and viruses since the introduction of computing technology, awareness of data security and sanctity did not gain much attention until introduction of the Internet. This is when many computers on
  • 12. the web offered hackers formidable playground to test their hacking skills including committing fraud, attacking websites and stealing data. Combating cybercrime is a multidisciplinary issue that includes not only hardware and software, but also policy and people, all of which are aimed at preventing cybercrime happening or minimizing its effects when it occurs. This is what amounts to cybersecurity. Mulligan and Schneider (2011) define cybersecurity as the practice of safeguarding computer systems, programs, as well as networks from digital attacks. However, there is no single strategy that is effective in combating cyberthreat because cybersecurity is a continuously evolving and constantly active process. Kremling and Parker (2017) assert that implementing effective cybersecurity approaches or measures is challenging today because of the huge number of devices in use and attackers are growing more innovative. An Understanding of Cybersecurity An effective cybersecurity measure has numerous layers of protection that are spread across devices, programs, data, and networks that a user intends to keep safe. In organizations, people, processes, as well as technologies must complement one another in order to establish a formidable defense from cyber threats and attacks (Singer & Friedman, 2014). Kremling and Parker (2017) posit that people must not only understand, but also comply with data security principles such as strong passwords, data backing, and being cautious of attachments in emails. Concerning processes, businesses must establish frameworks for dealing with attempted as well as successful cyber attacks. For instance, organizations can use the NIST cybersecurity framework to learn how to identify attacks, protects devices, detect and respond to attacks, as well as recover from successful attacks. Technology provides businesses and people the computer security tools required to safeguard themselves from cyber threats and attacks. Three important entities are worth protecting: networks and the cloud, endpoint devices such as computers, and smart devices. Some of
  • 13. the commonly used technologies used to safeguard these entities include DNS filtering, antivirus software, email security solutions, and DNS filtering as well as next generation firewalls (NIST, 2014). Importance of Cybersecurity In today’s closely connected world, everybody enjoys the fruits of advanced cyber-defense programs. Mulligan and Schneider (2011) indicate that at individual level, cybercrime can lead to identity theft, extortion attempts, and loss of crucial information. People depend on critical infrastructure such as power plants, banks, and hospitals. Thus, these organizations and critical infrastructures must be secured to keep the society functioning. People also benefit from activities of cyberthreat professionals and researchers who investigate new as well as emerging cyberthreats plus cyber attack strategies. Such studies reveal new vulnerabilities, enhance open source tools, and educate people on significance of cybersecurity. Social Impact of Cybersecurity Implementing cybersecurity to combat cyber threat and attack will affect people’s day to day activities and lives in a positive manner. For example, making cybersecurity the primary focus in significant places such as schools and organizations will enable many people understand the major cyber threats and how to prevent them from interfering with their day to day lives. It will also reduce financial losses that people incur because of cybercrime as well as lack of security in their daily business operations. Cybersecurity will also enable people understand significant technological changes and dynamics. There is also a possibility that cybersecurity measures to secure themselves from cybercrime issues (Teoh & Mahmood, 2017). Economic Impact of Cybersecurity Cybersecurity will cause significant lifestyle changes among people. Nonetheless, there is need to make it main aspect of people’s lives that will secure and safeguard from impacts of cybercrime. In as much as the process of implementing cybersecurity measures will involve significant cost, the results will bring significant economic benefits because it will reduce
  • 14. the amount of money that organizations would incur to deal with negative effects of cybercrime. A cost benefit analysis of implementing cybersecurity measures shows that the proposed solution would result in significant financial savings for businesses (Teoh & Mahmood, 2017). Technical and Legal Impacts Just as it is for other solutions, it is important to comply with legal and professional requirements when implementing cybersecurity measures. Some of the legal issues worth taking into consideration include data privacy and confidentiality before implementing this solution to cybercrime. From the technological perspective, it is important to consider various issues such as system failure in securing computer devices, programs, and systems. Technical considerations will also help in identifying technological bugs that may hinder the proposed solution from securing devices, programs, and systems from cyber threat and attack (Tropina & Callanan, 2015). Cybersecurity Context Organizations need a cybersecurity framework core structure in order to protect themselves against cyber attacks and threats. National Institute of Standards and Technology (2014) indicates that a framework core does not only describe a set of activities needed to attain specific cybersecurity outcomes, but also references guidance examples necessary to attain the outcomes. The framework core is not a checklist of significant actions worth performing but presents significant security outcomes determined by industry as crucial in managing cyber security risks. It comprises of four elements, namely: function, categories, and subcategories as well as informative references as depicted in figure 1. Figure 2: Framework core structure Functions Categories Subcategories Informative references Identify
  • 15. Protect Detect Respond Recover Functions tend to organize cybersecurity functions at their highest level. They include identify, protect, detect, respond, as well as recover. They help an organization in expressing its cybersecurity risk management by organizing information, facilitating risk management decision, addressing risks or threats, and improving by learning from past activities. Functions also align with currently existing incident management and help detect impact of investing in cybersecurity. Categories refer to subdivisions of function into cybersecurity outcome groups tied to programming needs as well as particular activities. Common examples of categories are asset management, detection processes as well as access control. Subcategories divide categories into specific technical and management activity outcomes. They provide set of outcomes that help in achieving each category’s specific outcomes. Informative references relate to sections of standards,
  • 16. practices, as well as guidelines illustrating method to attain each subcategory’s specific outcomes (NIST, 2014). Conclusion Around the globe, governments, businesses, and individuals have lost money, documents, and suffered from identity theft due to increasing cybercrime activities. Just as globalization, rapid expansion of Internet has exceeded regulatory capacity to address the impact of cybercrime, thereby creating a vacuum for many abuses. People depend on critical infrastructure and organizations, which must be secured in order to keep the society functioning. The way forward is to implement cybersecurity measures. Entities and individuals who develop cybersecurity framework core structure are in better positions to They identify and detect cyber attacks, to effectively respond to such attacks, and to protect as well as recover their critical data. References Clough, J. (2015). Principles of cybercrime (2nd ed.). Cambridge, England: Cambridge University Press. Kremling, J., & Parker, A. M. S. (2017). Cyberspace, cybersecurity, and cybercrime. Thousand Oaks, CA: SAGE Publications. Mulligan, D. K., & Schneider, F. B. (2011). Doctrine for cybersecurity. Daedalus, 140(4), 70-92. National Institute of Standards and Technology. (2014). Framework for improving critical infrastructure cybersecurity (v 1.0). Washington, D.C.: United States Department of Commerce Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: What everyone needs to know. New York, NY: Oxford University Press. Sinha, P., Boukhtouta, A., Belarde, V. H., & Debbabi, M. (2010, October). Insights from the analysis of the Mariposa botnet. In 2010 Fifth International Conference on Risks and Security of Internet and Systems (CRiSIS) (pp. 1-9). IEEE. Teoh, C. S., & Mahmood, A. K. (2017, July). National cyber
  • 17. security strategies for digital economy. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. Tropina, T., & Callanan, C. (2015). Self-and co-regulation in cybercrime, cybersecurity and national security. Heidelberg, Germany: Springer. United Nations Office on Drugs and Crime. (2013). Comprehensive study on cybercrime. New York, NY: United Nations Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). Thousand Oaks, CA: SAGE Publications Limited. M emo TO: Manager FROM: DATE: SUBJECT: Adopting Cybersecurity to Combat Cybercrime This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore,
  • 18. this memo is very vital for an individual to rea d and understand various aspects. Memo TO: Manager FROM: DATE: SUBJECT: Adopting Cybersecurity to Combat Cybercrime This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects. create a 2-3 page report defining your problem. It must include the following: · A title page · Headings that indicate major sections (INTRODUCTION, DISCUSSION, CONCLUSION) and subsections (such as Statement of Purpose, Background, and anything relevant to your particular topic; for example, Childcare issues and productivity) · Formal language · Research FEASIBILITY REPORT 1
  • 19. FEASIBILITY REPORT 6 Feasibility Report MEMO TO: Manager FROM: DATE: SUBJECT: This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
  • 20. Feasibility Report It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime. One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts. This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem. The Social Impact When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and
  • 21. ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015). When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every country secure and safe from the cybercrime problems. Economic Effect. One of the most critical aspects of coming up with the proposed solution is the economic feasibility impact. The projected resolution calls for basically a change in lifestyle in the United States. The cybersecurity needs to be the main part of the individuals that will make them safe and preventing the occurrence of cybercrime. The cybersecurity has to be implemented in the workplace and various institutions to achieve the required objectives of solving the issue of cybercrime in society. The process of implementation has a great financial cost, but the results brought by the proposed solution will bring much economical cost since it will reduce the amount that could have been used to solve the loss and cases caused by the cybercrime in the society. When the financial loss incurred due to the cybercrime is compared to the cost of implementing the solution, there is a significant difference since the proposed solution implementation saves much money. Technical and Legal Issues For every proposed solution, becoming successful in solving the intended problem, there are several legal and professional issues to be followed during the process of implementation. To implement cybersecurity in the workplaces and the institutions,
  • 22. some legal issues have to be developed for it to be successful. Also, during the process of implementation of the cybersecurity, the technical aspects have to be looked at. The technical issues involve various aspects such as unforeseen failure of the system in providing the solution for the problem. The technical issues will also identify the bugs that will prevent the proposed solution from providing the solution to the major problem. The proposed solutions seem to be free from the technical and legal issues, and thus it may provide the required solution to the major problem of cybercrime in the United States. Conclusion Generally, the proposed solution to the major problem of Cybercrime in the United States is more feasible. The problem in achieving the solution is the lack of financial support during the process of implementation of the proposed solution. If the proposed solution gets financial support, it requires, and it will be easy to implement it and bring the required resolution. However, considering all other criteria measured to determine the feasibility of the proposed solution, I found that implementing the solution either caused little to no impact or had a positive effect, such as the case with Social implications. From the above observation, if there will be no financial distress during the implementation process, the proposed solution will be successful in solving the major problem of cybersecurity. References Statistica Research Department. (Published August 9, 2019). Spending on Cybersecurity in the United States from 2010 to 2018. Statistica. Retrieved from https://www.statista.com/statistics/615450/cybersecurity- spending-in-the-us/ Clement, J. (Published July 9, 2019). Amount of monetary
  • 23. damage caused by reported cybercrime to the IC3 from 2001 to 2018. Statistica. Retrieved from https://www.statista.com/statistics/267132/total- damage-caused-by-by-cyber-crime-in-the-us/ Bada, M. & Nurse, J. (Accessed February 2020). The Social and Psychological Impact of Cyber-Attacks. Emerging Cyber Threats and Cognitive Vulnerabilities. Retrieved from https://arxiv.org/ftp/arxiv/papers/1909/1909.13256.pdf Help Net Security. (Published February 26, 2015). The business and social impacts of cybersecurity issues. Retrieved from https://www.helpnetsecurity.com/2015/02/26/the-business-and- social-impacts-of-cyber-security-issues/