Business Law Cyber Crimes Essay

PAGES
2
WORDS
690
Cite

Cyber crime is an ongoing and growing problem for businesses, for government, and for private individuals throughout the world. This paper identifies the kinds of cyber crime that are threatening computer users, notably businesses. It also proposes strategies that businesses can embrace that will (in many cases) prevent the intrusion of cyber criminals into servers and hard drives. What particular cyber crimes do businesses / individuals need to be wary of?

An article in the peer-reviewed journal Performance Improvement (Nykodym, et al., 2010) points out -- using FBI data from 2005 -- that computer crimes cost American organizations an estimated $67.2 billion every year. Not all cyber crimes are committed against businesses in order to steal passwords and intrude into servers to re-route financial information or actually seize funds from companies. In fact an FBI update in 2012 reports that the Internet Crime Complaint Center (IC3) has received 290,000 complaints from individuals who have been scammed through Internet fraud. A common form of cyber crime that is imposed on individuals is through the use of "scareware"...

...

The computer user suddenly sees a pop up that warns of a threat to the computer; it asks the user to purchase antivirus software to knock down the threat.
Cyber crimes in a business setting specifically. As to businesses -- corporations and small businesses too -- there is a great deal to worry about because cyber threats are taking their toll. Nykodym explains that many executives "…overlook computer crime as a serious threat…only 4% of polled executives indicated that cyber crime represented a serious hazard to their business property" (43). But there are serious threats and because of that managers and executives are not the right people to be on top of the threats; the company should have a security expert on board (Nykodym, 44). Investigative journalist Bert Latamore explains that cyber criminals are acquiring business information like "…unannounced quarterly results, engineering and design drawings for new products," and updated business strategies (Latamore, 2010, p. 11). They get this information by using a "bot" (short for "robot"), allowing thieves…

Sources Used in Documents:

Works Cited

FBI. (2012). Internet Crime 2012 / IC3 Releases Annual Report. Retrieved June 28, 2013, from http://www.fbi.gov.

Latamore, Bert. (2010). Cyber Threat Growing More Focused and More Sophisticated. Seybold Report: Analyzing Publishing Technologies, 19(1), 11-14.

Nykodym, N., Kahle-Piasecki, L., and Marsillac, E.L. (2010). The Managers Guide to Understanding, Detecting, and Thwarting Computer Crime: An International Performance

Issue. Performance Improvement, 49(5), 42-47.


Cite this Document:

"Business Law Cyber Crimes" (2013, June 28) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/business-law-cyber-crimes-98226

"Business Law Cyber Crimes" 28 June 2013. Web.19 April. 2024. <
https://www.paperdue.com/essay/business-law-cyber-crimes-98226>

"Business Law Cyber Crimes", 28 June 2013, Accessed.19 April. 2024,
https://www.paperdue.com/essay/business-law-cyber-crimes-98226

Related Documents

Cyber Crimes and the FBI The investigative techniques used by the FBI in the case of Vasiliy Gorshkov and Alexey Ivanov were completely legitimate and necessary; moreover, they demonstrated that law enforcement of the United States was prepared to use any means necessary to apprehend these flagrant security risks. "Court papers described the men as kingpins of Russian computer crime who hacked into the networks of at least 40 U.S. companies

Laws on Cyber Crimes
PAGES 10 WORDS 2997

Cyber Security Currently, the internet has become a significant infrastructure, which has brought new degrees of productivity, convenience, and effectiveness for the private and public firms. The many incidents of internet attacks reflect the vulnerability of the information systems, the severity of malicious programs and the offensive nature of technology. Similarly, either attackers can hide their identity, through disabling logging facilities or altering event logs, which makes them go undetected. On

Cyber crime is pernicious and can only be stopped through a widespread and diverse campaign involving primarily prevention. Moreover, cyber crime can only be prevented and stopped by better understanding the types of cyber crimes, and differentiating between them. For individuals and businesses, preventing cyber crimes entails a variety of common sense activities and tools including overall education and awareness that includes ongoing updates about how to secure sensitive data

History of Cyber Crimes
PAGES 5 WORDS 1827

Cybercrime, Cybercriminals, And Cybercops Cybercrime Cybercrime has long been perceived to represent new crimes arising from the emergence of technological advancement, but an examination of the history of cybercrime reveal that its roots are as ancient as the crimes of fraud, harassment, and malicious property damage. The history of cybercrime is reviewed briefly here, as are the challenges faced by law enforcement efforts to curb cybercrime. Some gains have been realized, such

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch