Thursday, February 18, 2016

Cyber Criminals

     Computer crimes have long penetrated and proliferated the world of technology and its networking connections resulting in many differentiating criminal behaviors (Warikoo, 2014).From personal user to large corporate networking systems, computer criminals are contently looking to unethically penetrate a networking system. Such forms of criminal behaviors will vary, however, all computer related crimes require a technological platform, user knowledge, as well formidable application implementations.
How Computer related Crimes Occur
       How do computer crimes occur, well, it occurs as a result of lack and due diligence of administrative, technical, and physical security contributions (Ballard, 2011)? A primary example of a proliferated computer crime is known as a distributed denial of service. This process utilized clones machines, excessive number of request, and creates a system dysfunction which allows attackers to enter from a “backdoor.” The countless amounts of financial gain is often times the primary motive for many criminals.
Criminal Motivations
       According to the research, criminal are accessing information system through a verity of attacks that are performed on the targeted system or use (Greeg, 2011).  The motivational concepts that are known to generate computer crimes include many intrusive practices. For example, personal gains, business defacing, as well as capturing and extracting identifiable information for the sole purpose of committing identity fraud.
Resulting Criminal Behaviors
       The resulting effect that are caused by computer criminal will range from stolen identities to financial fraud too that of destroying the target networking infrastructure (Baker, 2011, p. 46). From the loss of billions of dollars annually due to financial fraud too that of potentially leaking proprietary information, in both cases, that amount of individuals involved exceed more than the attacker as well as the target. The staggering amount of computer criminals are contently growing and posing new threats, risk, and countless vulnerabilities.
Conclusion
       As a result of the ever growing and the increased mythologies of unethical penetration of the networking infrastructure, many criminal are finding the accessing escalated levels of privileges are becoming more prevalent as a result of techniques and application strategies that accompany the hacking concepts. Although many forms of computer security has been developed and implemented, attackers are on the frontline of creating access points when system administrators fail to implement associated controls.






                                  Work Cited
Baker, D. J. (2011, February 1st). THE IMPOSSIBTLITY OF A CRITICALLY OBJECTIVE CRIMINAL LAW. . Ebsco Host, p. 46.
Ballard, B. (2011). Access Control, Authentication, and Public Key Infrastructures. Sudbury, MA: Jones and Bartlett Learning.
Greeg, S. P. (2011). Hacker Techniques, Tools, and Incident Respoonse. Sudbury, MA: Jones and Bartlett Learning.

Warikoo, A. (2014, August 1st). Proposed Methodology for Cyber Criminal Profiling. . Ebsco Host, p. 7.

No comments:

Post a Comment