Cyber Crime and Internet Influences

1396 Words3 Pages

Introduction History affords for the realization that criminals have always existed. The only variable in their existence is time, which inevitable subjects them to initiate changes in their methodology, unique to every generation. Our generation exists in an error where the application of information communication technology as proliferated by the internet, has become part and parcel of our daily lives. The internet influences how we live, work and play as part of our daily routines. It is this inevitable quandary that has provided criminals with a new frontier for their activities; one that they can operate within with absolute stealth and the cunningness of a fox. This is the age of cyber criminals, individuals who specialize in stealing people’s identities and personal information by hacking into their computers or internet based accounts. Their rise has presented security challenges for both public and private sectors, but mostly the public under the government, which is ultimately tasked with protecting each and every citizen. With the government ubiquitously admitting to an austere shortage in cyber professionals, should the government consider hiring cyber criminals as watchdogs of cyber security? Research Problem The problem this paper will endeavor to address is that of cyber security or the lack of it, characterized by the cybernation of our lives, which has increased our vulnerability to cyber-attacks. The scope of the threat posed by cyber insecurity will be addressed. How severe is threat posed by cyber criminals? How do they operate? The ramifications of cybercrimes and their impact on the economy are without a doubt cause for government. In addressing the problem, however, the government faces the dilemma of acce... ... middle of paper ... ...%20cyber%20crime%20pov%20jan252010.pdf Maelnkovich, S. (2012). What Motivates Cybercriminals? Money, Of course. Kaspersky Lab. Accessed on 29th May, 2014 from http://blog.kaspersky.com/what-motivates-cybercriminals-money-of-course/ The Carnegie Mellon University. (2014). How Cyber Criminals Operate. In Carnegiecyberacademy.com. Accessed on 29th May, 2014 from http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/operate.html Tobias, W. M. (2014). Your Cyber Security: Don’t Count on the Government. Forbes. Accessed on 29th May, 2014 from http://www.forbes.com/sites/marcwebertobias/2014/05/12/your-cybersecurity-dont-count-on-the-government/ The US House of Representatives. (2014). Recommendations of the House Republican Cybersecurity Task Force. Congress. Accessed on 29th May, 2014 from http://thornberry.house.gov/uploadedfiles/cstf_final_recommendations.pdf

More about Cyber Crime and Internet Influences

Open Document