StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting - Literature review Example

Cite this document
Summary
This paper presents specific qualities and specific definitions for cybercrimes, cybersecurity, and remedies for attacks and intrusions.  In general, cybercrimes are those offences where computers and smartphones are involved, mostly where data or information from such computers or devices are unlawfully accessed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting
Read Text Preview

Extract of sample "Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting"

Download file to see previous pages

However, these technologies represent significant costs for communication companies, and ultimately, the general public. With more businesses coming to depend on computers and internet-based systems, attacks on these systems have increased. Such attacks have been considered crimes which covers the application of computer networks, alongside financial scams, hacking, virus attacks, phishing, cyber stalking, and pornography (Li, et al. 2012). In 2000 for instance, the ILOVEYOU virus caused billions of dollars in damage to different computers and companies all over the world (Mishra and Pajrapati, 2013).

It was later discovered that two Filipinos were responsible for the creation of the virus. However, since the Philippines, at that time, did not have any cybercrime laws which would have held the perpetrators accountable, the perpetrators were later released (Mishra and Pajrapati, 2013). Regardless of the presence or absence of cybercrime laws however, the apprehension and prosecution of perpetrators have been made difficult by the nature of the offence, including the complications related to the cyber security awareness and cyber incident reporting (McGuire and Dowling, 2013; KPMG, 2011).

This paper shall carry out a literature review of cybercrimes, cyber security awareness, including cyber incident reporting. Related details shall refer to the usual cybercrimes which have gained notoriety and in general, government actions related to cybercrimes, and the challenges presented by cybercrimes and cyber security.According to Gercke (2012) cybercrimes are also considered in relation to computer crimes. Different perspectives have been considered to develop a more encompassing definition and understanding of cybercrimes and computer crimes (Gercke, 2012).

Cybercrimes nevertheless have a more specific focus than computer-related crimes, especially as computer-crimes only involve computers (Stephenson and Gilbert, 2013).  Computer-related crimes include crimes which do not actually have a specific relationship to a network.  The most acceptable definition for cybercrime was laid out in 2000 by the 10th UN Congress on the Prevention of Crime and the Treatment of Offenders (Gercke, 2012).   

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Crime Literature review Example | Topics and Well Written Essays - 6500 words”, n.d.)
Cyber Crime Literature review Example | Topics and Well Written Essays - 6500 words. Retrieved from https://studentshare.org/information-technology/1692247-cyber-crime
(Cyber Crime Literature Review Example | Topics and Well Written Essays - 6500 Words)
Cyber Crime Literature Review Example | Topics and Well Written Essays - 6500 Words. https://studentshare.org/information-technology/1692247-cyber-crime.
“Cyber Crime Literature Review Example | Topics and Well Written Essays - 6500 Words”, n.d. https://studentshare.org/information-technology/1692247-cyber-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Cyber Crime, Cyber Security Awareness and Cyber Incident Reporting

Freedom of Speech and Internet Privacy

The differences between existence in one's physical space and cyber space have been disputed for a while; many are skeptical about the extent of control that authorities have in cyber space, as they feel that their privacy is being undermined.... It would also mean that privacy and security is only limited to the physical space that people live in and cannot be extended to cyber space....
7 Pages (1750 words) Report

Portland Cement Mortar Cubes

The objective of this experiment is to apply the ASTM C 109 and C 150 in testing the compressive strength of Portland type 1cement at the first, third and the seventh days.... ASTM C 109 defines the procedure for testing compressive strength of hydraulic mortar using 50 by 50… ASTM C 150 gives the standard specifications for Portland Cement. The apparatus used included Fine aggregate, Portland type 1cement, Molds for mortar cubes, scale, measures, testing machine, tamper, trowel, moist cabinet, mixer, bowl and paddle....
3 Pages (750 words) Lab Report

Journal Critique

Constant security checks and initiatives for improving security would however be necessary to raise my trust in the reliability, security, and privacy of the data because of the significance of cyber crime that poses emerging techniques for security breach.... I would trust an external provider with my organization's data because of the security and operational benefits that such an organization offer to data storage and management.... The need to satisfy customers, for customer retention, also motivates 22 October ISOM Term Paper Trusting an External Provider I would trust an external provider with my organization's data because of the security and operational benefits that such an organization offer to data storage and management....
1 Pages (250 words) Book Report/Review

Fiber Optics and Fiber Optic Communication

This light travels by internal reflection.... The reason is that the medium of the core reflects more than the material surrounding it.... As a result, light is… This enables the fiber optic cables to transmit voice, images and even other forms of data in a very high speed that is almost the speed of light....
1 Pages (250 words) Lab Report

Response paper

In the other two articles, Being Insane in Insane places and The cyber Worlds of Self-Injurers: Deviant Communities, Relationships, and Selves, they use the same dimension to explain who is a deviant person, that is, what is wrongly perceived by the society and what should be the true attribute of a deviant behavior.... The cyber worlds of self-injurers: Deviant communities, relationships, and selves....
2 Pages (500 words) Book Report/Review

Competitors of Uber Company in Australia

The Uber Company might have 10% of the total market share.... In 2011, the Uber Company has raised around 49 million dollars in venture funds.... This provides vivid explanation about the continued growth… By the end of the year 2015, the estimated revenue generated by Uber Company is believed to be 10 billion dollars....
5 Pages (1250 words) Book Report/Review

Instructions for Burying Fiber Optic Cable

The paper "Fiber Optic Cable" presents the instructions for burying Fiber Optic Cable, as far as, only the appropriate way of installation can ensure safety and good working condition.... Also, the paper includes some important definitions of key terms.... hellip; Installation of the buried kinds of the primary and secondary cables should be done in the footway that is at a distance from the carriageway....
6 Pages (1500 words) Report

Analysis of The Legend of the Baal-Shem by Martin Buber

The author examines the book “TheLegendd of Baal-Shem” by Martin Buber that critically offers a descriptive account of the Jewish Hasidim as well as translations of stories that describe the life of the sect's founder who was known as Baal-Shem Tov which is translated as Master of God's name… Although Baal-Shem Tov was initially scorned by the Rabbinical establishment of his time, he ultimately became a figure of religious devotion among peasants, commoners, and visionaries of the 18th century....
5 Pages (1250 words) Book Report/Review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us