StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Preventing Cybercrimes - Coursework Example

Cite this document
Summary
The paper "Preventing Cybercrimes" focuses on the critical analysis of the major issues in the prevention of cybercrimes. Cybercrimes have a much wider impact than traditional crimes. This is because the amount of data stored on an electronic machine is much greater…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
Preventing Cybercrimes
Read Text Preview

Extract of sample "Preventing Cybercrimes"

Even then only one bullet could be fired at a time before the musket would need to be reloaded. Compare this to now, where a semi-automatic machine gun can spray out hundreds of bullets per minute and rarely needs to be reloaded. The example used of a bank robbery is perfect because it is low risk and low reward. The robber is only going to be able to do it once, and he will only make a small return for doing so. If a hacker gains access to a computer system, he can steal multiple times and also take large amounts of cash each time. These two instances of crime are different in nature and different in reward. I also agree that those who commit cyber crimes should be punished more severely than those who commit traditional crimes. The level of skill involved almost removes the defense argument that the accused did not know what they were doing.

Although terrorists may seem irrational in their actions, they are clever and calculated when it comes to doing damage to those who they oppose. Risk and return are a huge part of any terrorist operation because there is no point in doing something only to be caught for doing so. Terrorists are always trying to do the most damage and gain the most value without being apprehended for what they do. Cyber terrorists, however, do not seem to act rationally when it comes to doing an illegal act. This is quite ironic because “computer geeks” are always thought to be smart and calculated. I agree that the objective may not always be to gain something but to simply disrupt services already provided and diminish the public’s confidence in those services. The incentive for cyber terrorists is huge because they have the chance to disturb society from its normal state and become infamous at the same time. Owners of important government infrastructure need to ensure that defenses against cyber terrorists remain strong, because if even one succeeds, it may spur other like-minded individuals on to doing something similar. If a cyber attack cannot be prevented, then the focus should switch to how to repair things after the fact. Transportation systems and the like are vital to the functioning of society, so they need to be fixed as soon as possible after a cyber attack. Doing so only frustrates these individuals and discourages them from doing so again. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Cybersecurity Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1603174-cybersecurity
(Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words)
Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1603174-cybersecurity.
“Cybersecurity Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1603174-cybersecurity.
  • Cited: 0 times

CHECK THESE SAMPLES OF Preventing Cybercrimes

Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime

Current federal legislation and the standards based on securing and preventing cybercrime will be analyzed.... This report "Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime" presents security risk analysis taking in view military radar satellite communication systems....
12 Pages (3000 words) Report

Cybercrime - Illegitimate Use of Internet

This paper addresses cybercrimes in terms of how the problem started, and its current position.... ) claims that the availability of various opportunities in innovation was the main initiating aspect of cybercrimes.... Such advancements gave birth to computer crime as people looked for better chances to benefit both rightly and through evil actions such as cybercrimes.... cybercrimes involve offenses committed against certain individuals or even several groups of individuals....
9 Pages (2250 words) Research Paper

Privacy and Security Issues Online

In the paper 'Privacy and Security Issues Online' the author focuses on the need to use the internet for business or e-commerce, which has come from the demand within businesses and governments to make better use of computing technology.... ... ... ... The author explains that in recent years, especially in the twenty-first century, the increasing number of internet users and rapid growth of networks and technologies, such as laptops and internet enabled phones, has made e-commerce to be viewed as one of the killer applications of the computer and communication technologies....
8 Pages (2000 words) Essay

Is Russia Still Committed to Glasnost

In the report 'Is Russia Still Committed to Glasnost?... the author shows a doubt about the future of glasnost in Russia.... The presidents who ruled Russia after the Gorbachev era has formulated contradictory policies.... For example, Vladimir Putin wants the former Soviet Union back.... ... ... ...
5 Pages (1250 words) Assignment

Computer Misuse Act 1990: Effectiveness in the Light of Evolving and Increasing Cyber Attacks

"Computer Misuse Act 1990: Effectiveness in the Light of Evolving and Increasing Cyber Attacks" paper argues that countries with legal frameworks to handle cybercrimes have a challenge of making them as adequate as possible and the challenge poses threats of being obsolete as more crimes emerge....
12 Pages (3000 words) Coursework

Internet Law and the Privacy Act 1988

The paper "Internet Law and the Privacy Act 1988 " discusses that harmonizing the legislation is obviously not enough.... This article has shown what the major tendencies in the field are and how fast everything is changing.... In this context, repression is not sufficient anymore.... ... ... ... One of the major polemics as regards cybercrime relates to its very definition....
18 Pages (4500 words) Assignment

The Problem of Cybercrime Globally

This is evident with the prevalence of cybercrimes reported in the two countries.... The internet serves as the primary tool for conducting cybercrimes.... To large a extent, cybercrimes differ from other forms of crimes in four ways: 'Easy to learn and commit; require few resources; committed in a jurisdiction without individual's physical presence; in most cases not illegal.... In many cases, crimes referred to as cybercrimes by law enforcers are just the 'same old stuff, except for the involvement of computer networks....
5 Pages (1250 words) Coursework

Cybercrime: Policing and the Changing Criminal Landscape

The paper "Cybercrime: Policing and the Changing Criminal Landscape" has discussed the role of police in the fight against cybercrime and how they are limited currently in their efforts to reduce the rates of crimes committed with the aid of digital devices.... ... ... ... All over the globe, the police are known to be first responders whenever a crime is reported to have occurred....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us