Please describe an instance of which you are aware in which an act of internet crime took place.
Criterion Description Points possible
Content Initial response addresses 5
Word Count 250 Words 5
Response To Participant responds to 10
Classmates two classmates,
and response furthers the discussion,
(e.g., asks a question, provides further
information or examples, or introduces
a different opinion (10points/per posting).
100 words minimum word count for reply post.
Total Points possible 20
The world is changing fast, and technology is something that is on the forefront. With an increasing rate of innovations and storage of data in the cloud and inform of an electronic form, there is a get risk of data being tampered with. When innovators come up with security to block them from getting through the firewalls and retrieve the data. Most companies and organizations have suffered the impact of cyber-crime where their data have been hacked and used inappropriately.
In the United States, the reports of major incidences of cyber-crimes are reported weekly if not daily. This is best evidenced in crypto-jacking that had its rise in 2018. There were numerous security alerts that were provided to the general public so that they do not become victims of cyber-crime that is so rampant. Crypto-jacking in 2018 was so big that it was overtaking one of the big names in cyber-crime types, ransomware. It called for corporates and also individuals to make sure they protect their data. A lot of data penetrations were observed locally and internationally (Eskandari et al., April 2018). This is because Europe was also experiencing the same crypto-currency attack just like in the United States.
Crypto-jacking came up due to the development that cryptocurrency has been fetching since the year 2009. Bitcoin has proved its worth by centralizing the cryptocurrency. Since many people have come to be players in the big game, not everyone who comes in means good for the business. Through this, illegal miners have been in Ina position to retrieve data by hacking the cryptocurrency websites and gotten away with people’s money (Konoth et al, October 2018). It was observed that quite a good number of illegal miners were identified and their accounts were shut down. This was after angry customers raised the alert to the organization. The organization, on the other hand, was not willing to be on the receiving end as the process will scare away its potential customers and the end result would make the organization make losses which will be negative in sustaining itself.
Eskandari, S., Leoutsarakos, A., Mursch, T., & Clark, J. (2018, April). A first look at browser-based Cryptojacking. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 58-66). IEEE.
Konoth, R. K., Vineti, E., Moonsamy, V., Lindorfer, M., Kruegel, C., Bos, H., & Vigna, G. (2018, October). Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 1714-1730). ACM.
The introduction of the internet brought with it lots of improvements to our lives and method of communication. Also, with this innovation came a new way of crime. While the internet increased the rate of global communication it also increased the window via which crime can be committed. According to McGuire, Dowling, (2013), “cybercrimes are offenses that can only be committed using a computer, computer networks or another form of information communications technology (ICT). It includes the spread of virus and malware, hacking and distributed denial of service (DDoS) attacks”. One of the biggest cybercrimes I am aware of is the Target Data breach that took place in 2013.
This was one of the most impactful data breaches in the US. The impact of this breach was felt by approximately 70 million customers. The target of this act was credit card information utilized by Targets customer while performing transactions of the company’s e-commerce website. It was reported that the attacker got access to Targets database via a third-party vendor who had access to the system. Data breaches have become a norm in the cyber community; it is important that organizations take meticulous steps to ensure that their data and network are fortified against attacks. Some other popular cybercrimes are; phishing, keylogging, identity theft, online fraud or scam, Denial of services attacks, cyberstalking, viruses, social engineering, and illegal content distribution.
Let’s take an instance of internet crime that took place is when I was using my Facebook account, and in the process, the account was interrupted, and I could not log out. After some time, an unknown person was using my Facebook account. The account was used by the person to post some unsolicited messages to some of my friends. I realized this later and reset the password of the account and safeguarded it.
McGuire, M., & Dowling, S. (2013). Cybercrime: A review of the evidence. Summary of key findings and implications. Home Office Research report, 75.
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet. Academic press.