StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Anonymous Cyber-Attacks - PayPal - Essay Example

Cite this document
Summary
The paper "Anonymous Cyber-Attacks - PayPal" discusses that the Department of Homeland Security also agreed that collaboration is needed to enhance cyber security not only among countries but also among sectors to protect critical digital infrastructures from digital malfeasance…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.9% of users find it useful
Anonymous Cyber-Attacks - PayPal
Read Text Preview

Extract of sample "Anonymous Cyber-Attacks - PayPal"

The article involved Weatherhead and his three co-conspirators, Ashley Rhodes, 28, of south London, Peter Gibson, 24, of Hartlepool, and an 18-year-old from Chester where they carried out an online attack at PayPal using distributed denial of services (DDoS). DDos works by first downloading a free internet software called Low Orbit Ion Canon (LOIC) as a "destructive cyber weapon". Once downloaded, “the LOIC could be used to attack by sending internet traffic to a target computer…When the volume of traffic sent to a computer becomes too much for it to handle it would suffer a denial of service. The more LOICs used, therefore, to attack a target computer, the more likely that a denial of service will take place ” (Laville, 2012).

The irony of the hackers Anonymous is that they do not see themselves as criminals but rather online activists or hacktivists who conduct their protest by bringing a site down through DDos or other methods to teach them a lesson for whatever reason they can think of.

Impact of Cybercrime on worldwide justice systems
The advent and proliferation of cybercrime “forced” worldwide justice systems to adapt to crimes committed on the internet and institute laws to combat and prosecute them. As criminals became sophisticated, justice systems have to be responsive as well to arrest and prosecute cyber criminals. The absence of such laws that would enable law enforcers to track, monitor, arrest, and prosecute online criminals would make it an incentive for cybercriminals to launch their criminal activities online.
The classic example that we can cite of the need for countries to have an adaptive law that would serve as deterrence to would-be cyber criminals is the I Love You virus which was sent through malicious emails in early 2000 that overwrote the files of those who received them costing billions of dollars in the US and elsewhere in the world. While the culprit was known to be in the Philippines, authorities cannot do anything to arrest the individual due to the lack of laws to prosecute the person.

This incidence and other crimes facilitated on the internet such as fraud, human trafficking, and terrorism prompted the legislative body of such countries to craft a law to combat cybercrime. Albeit delayed, the Philippine legislature crafted a Cybercrime Act 9225 which was implemented this year (although a Temporary Restraining Order was issued against it) because of this incident and other crimes done through the internet.
The proliferation of cybercrime made governments worldwide acknowledge the digital space as a medium where cyber criminals can facilitate their illicit activities.

The process to combat global cybercrime
According to the Federal Bureau of Investigation or FBI, the best way to combat global cybercrime is through international cooperation. To effectively counter the threat of cybercrime, “The FBI is working closely with international law enforcement agencies to fight cybercriminals (FBI).To facilitate this international cooperation and collaboration an international conference was held at Fordham University in New York City this year which was attended by over 400 participants from 37 countries. Delegates from various sectors also attended from international counterparts ranging from law enforcement, business, government, and academia.

The conference which was taken as a process to combat global cybercrime involved finding solutions to the emerging cybercrime threat from different perspectives. One of the solutions found was a round-the-clock international cooperation of cyber investigators where cybercrime investigators “can “fast freeze” e-mail traffic and other stored electronic data, which can preserve a crook’s otherwise fleeting digital footprint” (FBI, 2010) thereby making them more effective in combating cybercrime.
The dialogue between countries and industries has to continue because the ways that cyber criminals wreak havoc online also evolve. This ensures that the ways to combat cybercrime are effective. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber crime Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/law/1463860-cyber-crime
(Cyber Crime Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/law/1463860-cyber-crime.
“Cyber Crime Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/law/1463860-cyber-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Anonymous Cyber-Attacks - PayPal

Security Policy - Part 4 [sap95]

The most affected companies include eBay and paypal.... Fortunately, companies within the advertisement industry counteract the effects impacted by such threats using anonymous Surfing protections.... Anonymizer (2011) emphasizes that anonymous surfing blocks email recipients from clicking on fraudulent links in their mails.... On the other hand, anonymous surfing protects users from evil twins by routing all their internet connections through a secure server....
3 Pages (750 words) Essay

Sony Attacked y Cyber Criminals

In the recent past attacks have been launched to websites that belong to US, Israel and Uganda governments and in organizations like MasterCard, Visa paypal and Sony among others.... The attack, which is credited to a hacking group called collective anonymous (Amoroso, 2007).... Threat actors anonymous collective or 'Anons' as it is referred to which is the short form for its full name is a group that was formed in 2004 that is against any form of censorship of online interactions, any type of censorship by governments or organizations where they respond by hacking websites belonging to church organizations, government agencies or departments, or organizations....
6 Pages (1500 words) Term Paper

Law: Computer Misuse

"Law: Computer Misuse" paper states that there is a need for proactive action by the implementation of ample security measures and establishment of International cyber laws rather than a reactive approach.... The call for preventive action over post-hoc reactions has been stressed.... .... ... ... There are many ways in which corporations, government agencies, and individual users can protect themselves and reduce the risks of intrusion into their computer networks (Soafaer & Goodman, 2003)....
7 Pages (1750 words) Essay

Hacking: Definition, Types, and Facts

This essay "Hacking: Definition, Types, and Facts" examines the theoretical and contextual perspective of hacking.... It also examines the comparison of various types of hacking and evaluation with their interpretations.... It further examines the social and political hacking of media.... ... ... ...
9 Pages (2250 words) Essay

Analysis of Hacking Attacks

The paper "Analysis of Hacking Attacks" states that Stuxnet has been proved to be able to control communication between PLC and Siemens programming station.... It hides changes made to PLC and it is rated as one of the most sophisticated engineered worms.... ... ... ... Stuxnet worm is one type that is believed to have been developed by the government for its development is considered to be a very complex and sophisticated one to be developed just by a private group (Holliday, 2010)....
24 Pages (6000 words) Coursework

Information Warfare and Cyberterrorism

This report "Information Warfare and Cyberterrorism" discusses cyber-attacks, hacktivism, and malware.... We should prep for the growth of Anonymous and the diversity of the ethics of cyber-attacks.... However, the framework shouldn't be deemed as a sole instrument essential for making ethical judgments of the cyber-attacks and crimes.... In addition to this, the percentages of attacks claimed by anonymous have been increasing in a rapid yet steady manner....
12 Pages (3000 words) Report

Analysis of Hacktivism on Social Change

This phenomenon gained popularity after a political group called Anonymous engaged in a number of cyber-attacks against companies, which suspended their services to WikiLeaks (Fitri 2011; Yip & Webber 2011).... The paper "Analysis of Hacktivism on Social Change" tells that WikiLeaks had to switch its website-hosting provider and sourced bandwidth from Amazon....
9 Pages (2250 words) Term Paper

Stages of Information Technology Governance

The paper "Stages of Information Technology Governance" is an engrossing example of coursework on information technology.... Information technology governance (ITG) is one of the most important strategic decisions a modern company has to make.... ITG is defined as 'IT governance is the responsibility of the Board of Directors and executive management....
15 Pages (3750 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us