Crime Workplace Is Not Safe From Numerous Essay
Excerpt from Essay :
Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only 3 or 4 people work at night-time, it is easy to target anyone of them but if a considerable amount of people work together and have no hostility towards each other, these types of situations can be avoided. Use of security systems is a pre-requisite for the protection of material wealth and belongings. These types of systems can help avoid theft and burglary but if somehow these do occur, it will inform the managers of the incident at the earliest and also make it hard for the offenders to flee the scene of crime.
There are quite a few expressive crimes which occur at place but these are usually the result of bottled-up anger and frustration in the staff or clients. If customers do not get proper service and customer care, they will end up being violent and this may result in violence, arson or even vandalism for that matter. If there is any kind of discrimination in the staff, promotions get offered on personal preference rather than professional capability, this will provoke the staff to the highest degree possible and crime will definitely be a repercussion of that.
There should be no discrimination of any kind in the workplace. Promotions and perks should be awarded on merit and everyone should get equal opportunity in every sense of the word. This is the root cause of violence which is usually done by insiders and goes on to become an incident of crime. Customers should be given the highest priority and they should be given highest level of respect and consideration. Other crimes can be avoided if there is a proper check at entrance at all times. If anyone enters or leaves the workplace, it should be recorded and a proper record should be maintained. Security systems and surveillance cameras are very important in this time and age. Access to the staff of organization should be given carefully, if anyone can enter, the security will become compromised.
However, cyber crime is the most challenging crime for any security manager to deal with. There is no physical evidence of it occurring and neither the perpetrators are nearby. It is not easy to track these criminals and the kind of damage they can do to an organization, person or the government, it becomes imperative to be technologically equipped, legally prepared and internationally permitted to deal with these kinds of criminals and their crimes. Cyber crime is inclusive of a range of different crimes. I have discussed about ways to avoid them, legally check them and confront them.
Identity theft occurs when virtual criminals gain access to private information of people; for instance place of residence, DOB and/or details of bank accounts). They take advantage of it by attempting to create fake accounts. Online scams occur when virtual offenders gain access to monetary or other kinds of important information by deceitful methods, typically by fooling people through frauds such as purchase deceit (wherein individuals are made to pay for goods which will not even be delivered to them).
'Phishing' is another fraudulent activity in which cyber criminals send fake money transfer requests from foreign countries to innumerable email accounts for the purpose of deceitfulness. 'Spear phishing' is a more specific approach in which a single individual is targeted with personalized fake emails. Virtual offenders also attempt to make people enter details into a bogus website and this is known as 'spoofing.' Pharming' is another tactic used by cyber criminals in which they re-direct website traffic from genuine website to a fake/bogus website.
Scareware is another such method of fooling people wherein cyber criminals make people download fake software into their computer. This can be any software but instead of performing the task it was created with, it proves detrimental to the computers where it has been downloaded; for instance, counterfeit anti-virus software) by making use of fright tactics or other immoral advertising practices. This aforementioned software is usually unsuccessful but it may seem to tackle some
kind of virus prior to infecting the system with the viruses it contains. Later, the victims have an undeniable need to give payments to these offenders so as to get rid of the virus and any impact it might have had on the entire system.
Financial or monetary deception occurs when cyber lawbreakers can refuse to outstanding dues or make deceptive assertion through the means of attacking authorized online channels (for example online self-evaluation forms). This also restricts the public-sector spending and culminates with decreased investment on the infrastructure. Virtual lawbreakers can also steal profits online from various businesses.. In most of the cases, the criminal is usually aided by an insider.
Extortion is another method used by cyber lawbreakers in which they make company pay to avoid intentional denial of service. For instance, they may make use of malware to inundate the server of a company with invalid online traffic. They may also alter the company website links by linking them to pornography or other such offensive material. This way the entire brand name loses its reputation in the market. These criminals have a knack for stealing data of individuals from a company (data can be monetary, medicinal or even a legally offensive record) for the purpose of retailing it to outsiders or using it for blackmailing attempts.
Industrial surveillance can take more than a few forms, for example, a competitor or a third party gaining illegal access to classified information for strategic or competitive benefits. For instance, the bidding price of an opponent's organization can be accessed. It is also possible to gain confidential knowledge or data for monetary gains.
IP theft is another tactic employed by cyber lawbreakers, usually financed by competitor companies or countries. Their job is to thieve information, designs, and product descriptions, trade undisclosed information, and systems. Money Laundering is another famous crime wherein virtual lawbreakers make use of online means to transfer the profits of illegal acts (for instance during composite, online, facilitated transfers amid international and distant foreign bank accounts).
Examples of Recent Cyber threats
Rhodes (2011) mentioned that the worm of Stuxnet (July 2010) (a composite computer cipher) was employed in the original cyber aggression that focused on particularly on developed control schemes. This attack was directed at Iran, and the nuclear programme of Iran. Stuxnet is unique because it allows cyber criminals to manoeuvre practical paraphernalia without the knowledge of any the operators. The worm aimed at Siemens' systems which were employed in the power sector to manage the infrastructure of nuclear, gas and also the industrializing & automotive production. It has been guesstimated that around five to ten people worked on the Stuxnet worm for a span of six months.
Rost & Glass (2011) mentioned that Operation Aurora (December 2009) Google identified an extraordinarily complicated and targeted aggression on its commercial communications emanating from the region of China. This attack had somehow installed malware through electronic post on systems of 30 firms and quite a few Government organizations. This was also one of the most dangerous attacks witnessed in the history of cybercrime.
Another all-encompassing scam (2009/10) in which It was a group based in Essex, which was put on trial for an internet scam. Because of this scam, they were making £2 million monthly by thieving log-in information from 600 bank accounts of UK and also fooling people into giving extra details at the log-in time. The Police e-Crime Unit worked shoulder-to-shoulder with the banking sector, revealed the deception which victimized poor safety measures on people's computers employing Zeus Trojan malware (i.e. A malevolent software programme camouflaged as an electronic post attachment).
Keats (2010) stated that Conficker (2008) A botnet has been operating on an unparalleled scale since the time of November 2008 disturbing billions of systems throughout the world by employing the Windows operating system. Estonia (2007) and Myanmar (2010) experienced famous DDoS transgressions which were claimed to be politically influenced. In either situation, numerous computers weighed down the solitary target at the same time.
Myanmar had also been cut-off from the Internet after dealing with 10 days of DDoS transgressions which concluded in a gigantic information inundation and this weighed down the country's communications systems a little before the common voting. Estonia's monetary functioning was relentlessly jeopardised and administration infrastructure networks were limited to the use of radio for a specific span of time.
Impact on Individuals
Citizens should take the initiative to decrease the consequences of virtual offences themselves. They should undertake numerous rational safety measures to be able to stay safe online. These may include steps like installing a firewall,…
Sources Used in Documents:
McCollonel '(2000). Cybercrime And Punishment. Page 8-9. www.mcconnellinternational.com.
Balkin J. M (2007)Cybercrime: digital cops in a networked environment. NYU PRESS. New York. USA.
Perline I.H. & Goldschmidt J. (2004). The psychology and law of workplace violence:a handbook for mental health professionals and employers. Charles C. Thomas Publisher. USA
Keats J. (2010) Virtual Words: Language on the Edge of Science and Technology. Oxford University Press. USA.
Cite This Essay: