Cybercrime and Its Implications

Assignment 1 — Rethinking Audience Discussion Board

Assignment Introduction

Don't use plagiarized sources. Get Your Custom Essay on
Cybercrime and Its Implications
Just from $13/Page
Order Essay

This assignment is a brainstorming and planning assignment for your upcoming public piece, which is due later in this module.

For the Public Piece in the next assignment, you will restructure your argument in order to reach a new audience by composing a public piece, an argument presented in a medium appropriate for the public domain. Therefore, your audience for this will be the general public and not the academic community.

For this assignment, you have the following options to reach the public:

1. An editorial cartoon that would be published in a newspaper

2. A public service announcement in the form of a video/commercial (1-2 minutes)

3. A poem or song that reflects thoughts and emotions relevant to your stance

Your public piece should:

1. Establish a clear audience and purpose.

2. Stand as an authentic, engaging, and polished piece that the public could consume.

3. Communicate an argument effectively with no gaps in logic or credibility.

Note: You will NOT create this piece in this discussion board. The assignment for this week is to engage in a discussion with peers as you plan and brainstorm your ideas. Your public piece will be due later in the module.

Discussion Board Assignment Guidelines

Please answer the following prompts on the Discussion Board in short paragraphs:

1. In a few sentences, what was your argument in the Research Paper?

2. Outside of the academic community, who would benefit from hearing this argument? Why?

3. With that audience, how might your argument change? What would your goal be with that audience?

4. Describe your audience. Discuss their potential biases and opposition to your argument. How do you overcome this?

5. What do you expect your audience to DO based on your argument? What is the PURPOSE of this communication with the audience?

6. What’s the best way — your genre — to reach this audience? (Choices: an editorial cartoon, a video or commercial, or a song/poem.)

7. Once you select the genre, discuss HOW to create that piece in order to reach the intended audience and purpose.

 

 

Cybercrime and Its Implications

Cybercrimes are malicious activities conducted by cybercriminals by using or targeting a computer. Cybercrimes involve activities like interference of system interceptions and data that affect networks and systems. Cybercriminals infect devices with viruses and malware to destroy them or cease them from operating. Cybercriminals can also use computers to conduct other crimes that require using systems to spread malware and unlawful information. Cybercriminals can be highly skilled using organized and advanced techniques or just novice hackers (Malby et al.). The main types of cybercrimes are phishing, malware attacks, distributed Dos attacks, credit card fraud, ransom ware attacks, internet fraud, identity fraud, corporate data, and cyber extortion. Cybercrimes are challenging the world; cybercriminals are advancing on their techniques and posing significant challenges to peoples’ finances and reputation and extorting businesses.

Cybercrimes over the internet are advancing substantively due to developments in technology in today’s world. They have forced businesses to get into long-term debts due to online identity thefts and ransom wares. Companies have had their files corrupted, activities have been disrupted, and others closed indefinitely. Computer-based variations like phishing and ransom ware attacks commonly used by attackers are easy to conduct because of anonymity, convenience, and internet speed. Most cybercriminals do not perform the crimes in their countries; they conduct their activities in countries with frail or no cybercrime rules to avoid being detected.

Cybercrimes do not occur in a void, they are well planned and distributed in nature, and some depend on others to perform their crimes (Ali et al.). Cybercriminals use various attack aspects to conduct cybercrimes; they seek new systems and techniques to execute their tasks. The internet has not allowed cybercriminals to evolve but has enabled them to upgrade their game; malware kits are available at cheap prices allowing novices to enter the world of crime.

Cybercrimes have a negative effect on technological infrastructure because attackers prey on their users for financial gain. Attackers achieve this by targeting computers and contaminating them with computer viruses; the viruses are extended to other networks which target users’ confidential information. Cybercriminals embezzle funds from banks; the criminals aim at financial organizations to get class security systems. The attackers also earn cash from ransom; the attackers look for anorganization that perform majority of its operations on the internet and takes down their sites; the company is given a demand to pay a certain amount of money for their system to get restored. Studies show that in ransom attacks, coercion claims range between $10 000 to $50 000. According to Yury Connolly, victims of ransom ware attacks opt to pay the ransoms to avoid the repercussions of their websites being taken down.

In their bid to get finances, cybercriminals steal credit cards; the stolen credit card particulars are then used by the attackers for their purchases. Attackers use impersonating to make money; attackers impersonate legitimate sellers and sell fake and non-existent items. Cybercriminals convince the victims to buy their counterfeit goods and disappear without delivering the services and goods(Kyung-shick and Lee). Cybercriminals also make money through crypto currencies; they use crypto jacking to get cash at the cost of victims without knowing they are taking part in the mining process. They use malware to take control of victims display program and use their computers to get finances without their comprehension.

Cybercrimes have a negative effect on people, organizations, and governments because of extorting businesses using malware; malware is malicious software designs meant to harm and export any programmable service, network, or device. Cybercriminals use malware to control computers then launch denial-of-service attacks, infect PCs, and use them to getcrypto currencies (Nurse). The main types of malwares are scare ware, viruses, Trojans, spyware, and fireless malware. For example, the home depots system was breached using malware; the breach exposed information and data for over fifty million credit cards. The attackers installed malware using a vendor’s username and password and assessed the company’s system. They positioned the malware on the organizations system of sales; it meant anyone who was swiping their credit cards was giving out their private credentials to the criminals.

Cybercriminals are using malware to extort businesses by sending it to computers; targeted victims run them without knowing they are infected. The malware holds back until users connect to a bank’s service; they take over and steal the vital particulars. The hidden malware lets the victims access their accounts, do authenticating, and then take over the system (Nurse). Through the malware, the attackers command transfer of money into their accounts, they hide the transactions for the user not to know their actual balance immediately. Internet users can protect themselves from malware by protecting their devices, keeping operation systems updated, and being careful online by avoiding unknown links and being selective in the sites they visit. They should be keen on the links they download operating system purchases and perform regular checks on their computers, bank accounts, and credit cards.

Cybercrime has an adverse impact in the view of the indispensability of the internet in everyday life, especially on the loss of reputation due to revealed personal information. Cybercriminals target standard and prominent people, steal their documents, and use them to extort people. They send viruses to the targeted victim’s computers and get their credentials; after that, they analyze all the sensitive information from the individuals and use it for extortion (Ali et al.). Some might be required to pay money for their information not to be publicized. Those who do not pay the required funds have their sensitive information like health status, conversations, or sensitive pictures publicized. Despite sending the required amount of money to save their reputation, some attackers keep the information to extort them to get finances whenever they do not have money. Due to the acts, some people get depressed and traumatized, some are fired from their jobs, and others opt to commit suicide.

The counterargument on cybercriminals is that most cybercrime victims do not take enough defenses on cybercrimes. I refute the claims because cybercriminals are advancing on the strategies they are using to attack by day. People, organizations, and governments are taking all the necessary steps to protect themselves from cybercrimes, but the attackers are a step ahead. As businesses continue to digitize and people get more connected to the internet, cybercriminals are looking for more ways to enter their networks. Despite technology struggling to stay on top of cybercrimes, cybercriminals are changing techniques and using all ways to avoid detection.

It is evident cybercrimes are challenging the world, cybercriminals are advancing their techniques and posing challenges on people’s finances, and reputation and extorting businesses. The world is digitizing; although not everyone is a victim of cybercrimes, eventually, everyone will be at risk. Technology is advancing, and cybercriminals are enhancing the techniques they use to get their victims. Cybercriminals are using the internet to earn money, breach national security systems, taint people’s reputations, cause electrical blackouts and failure of military equipment. Defense starts with individuals; being aware of cybercriminals’ methods to attack will give people a strong defense against attacks. Cybercrimes are not going to be eradicated anytime soon; they are deepening their roots by day. However, with a combination of security awareness and advancing technology, cybercriminal threats can be managed.

Works Cited

ALI, NI, et al. “Cybercrime an emerging challenge for internet users: An overview.” Sindh University Research Journal (Science Series) 50.3D. 2018: 55-58. https://www.researchgate.net/publication/333132250_Cybercrime_an_emerging_challenge_for_internet_users_An_overview.

Choi, Kyung-shick, and Claire Seungeun Lee. “The present and future of cybercrime, cyberterrorism, and cybersecurity.” International Journal of Cybersecurity Intelligence & Cybercrime 1.1. 2018: 14. https://www.researchgate.net/publication/328433593_The_Present_and_Future_of_Cybercrime_Cyberterrorism_and_Cybersecurity.

Malby, Steven, et al. “Comprehensive study on cybercrime.” United Nations Office on Drugs and Crime, Tech. Rep. 2013. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

Nurse, Jason RC. “Cybercrime and you: How criminals attack and the human factors that they seek to exploit.” arXiv preprint arXiv:1811.06624. 2018. https://www.researchgate.net/publication/328762019_Cybercrime_and_You_How_Criminals_Attack_and_the_Human_Factors_That_They_Seek_to_Exploit

Yuryna Connolly, Lena, et al. “An Empirical Study of Ransomware Attacks on Organizations: An Assessment of Severity and Salient Factors Affecting Vulnerability.” Journal of Cybersecurity, vol. 6, no. 1. 2020. Crossref, doi:10.1093/cybsec/tyaa023.

ORDER NOW »»

and taste our undisputed quality.