It Risk Management -- Cyber Research Paper

Length: 15 pages Sources: 1+ Subject: Criminal Justice Type: Research Paper Paper: #38954961 Related Topics: Cyber Crimes, Cyber Crime, Forensic Accounting, Firewalls
Excerpt from Research Paper :

The organizations are usually run by a core group, which divides the different responsibilities of an operation (e.g. spamming, web design, data collection) among the members. The members run their own outer networks to fulfill those responsibilities -- rarely even having contact with each other online. The decentralized structure of the internet, as well as the high levels of anonymity it provides makes it difficult for law enforcement agencies to locate cybercriminal groups. A group could have networks in a myriad of different countries, whilst using servers based in numerous different countries and jurisdictions. Furthermore, many national jurisdictions lack the legislative framework required to properly prosecute online crime." (Collins, 2012)

These insights are illustrating how the lack of self-control is creating a situation where more criminals or organizations are turning to cyber crime. What makes the situation worse; is they can work anonymously and be able to conduct these activities with little to no negative effects. It is at this point, when these individuals and groups are participating in order to reap the lucrative rewards from them. This is illustrating how the self-control theory is highlighting why this becoming so common and the effects it is having criminals and other related organizations. (Collins, 2012)

The Routine Theory

The routine theory believes that crimes will occur when there is an intersection between the time, space, motivated offenders, attractive targets and a lack of effective law enforcement. This creates the perfect environment for someone to conduct illegal activities and it increases the odds that they will be able to get away with it. When this occurs, they will continue to commit these crimes over and over based upon the rewards they are receiving from them. According to Walsh (2010), this will encourage these activities to become more frequent, until there is some kind of effective deterrent in place to stop them. (Walsh, 2010)

Evidence of this can be seen with Walsh (2010) saying, "It does not so much matter why individuals are motivated to commit crimes, what matters is that an individual with the inclination to commit a crime is in the right place to move against his or her target at the right time when there is no one around to stop the offender. The absence of any one of the conditions would be sufficient to prevent a crime from occurring. If an individual is motivated to steal an object from a victim's house, but there is always someone home, then the offender will be unable to commit the crime. In sum, according to routine activity theory; a crime can only occur if there is an offender, a suitable target, and no guardians around to protect the target." (Walsh, 2010)

This is illustrating how criminal activities will occur when there is the opportunity to conduct them and a high probability of being able to benefit. In the case, of cyber crime, these issues are common with lack of regulations, effective monitoring and no one is aware of what is happening until it is too late. The more individuals and organizations realize this, the greater the odds are that these activities will become increasingly common. This is the exact situation and one of the reasons why it is continually increasing in scope. (Yates, 2013)

Tools / Techniques

There are a number of different tools and techniques which are utilized by cyber criminals to conduct a variety of attacks against vulnerable targets. The most notable include: botnets, fast flux, social engineering and skimmers. Each one of these areas has been utilized to achieve the different objectives of these individuals or organizations. In some cases, this can occur with them completely shutting down an entire computer system or network. While at other times, they will involve stealing personal or financial information. (Casey, 2011)

A botnet is a network of robots (i.e. bots) which are designed to spread malware. This is used to infect a computer system's files and provide criminals with access to the information inside it. This takes place in the form of a denial of service attack....


When this occurs, it floods a server or network with traffic in order to make it unavailable to users. In many cases, this is often used as a preferred method of seeking out computers that are online and infecting them with some kind of virus. According to Robinson (2011), these techniques are the most common tools which are utilized to gain access to critical information. (Robinson, 2011) (Casey, 2011)

Evidence of this can be seen with him saying, "The use of botnets for malicious activities has grown significantly in recent years. Criminals leverage the flexibility and anonymity associated with botnets to harvest personal data, generate spam, distribute malware and launch distributed denial-of-service attacks. These same attributes readily translate to applications that can support operations in warfare. In 2008, distributed denial-of-service attacks launched by botnets targeted it assets belonging to Estonian banks, newspapers and parliament. This crippled their infrastructure for weeks. " (Robinson, 2011)

This is illustrating how these tools and techniques can allow criminals to take control of entire networks and exploit the information inside. When this happens, they can quickly retrieve it and prevent someone from being able to access it in the future. It is at this point, when the victim will be forced to spend time and money trying to restore everything back to normal. During this process, these individuals and organizations will have achieved their primary goals and moved onto another entity with similar vulnerabilities. Once this process is continually repeated, the rewards for these kinds of activities can be very lucrative for anyone who is conducting them. (Robinson, 2011) (Casey, 2011)

Fast flux is quickly moving data around to avoid any kind of detection of the malware software or where it originated from. This often involves using computers which have been hacked into and seizing control of them (in order to hide the location / identity of cyber criminals). The way that this is achieved is a large number of IP addresses are collected and these computers are utilized to hide the location where the attack is originating from. (Robinson, 2011) (Casey, 2011)

This makes it difficult to determine who is involved and the precise locations they are operating. For cyber criminals, this is an effective tool / technique to quickly steal information and have no one know where they are at until it is too late. It is at this point when they can move on to another location and protect themselves against detection from law enforcement. (Robinson, 2011) (Casey, 2011)

Social engineering is when cyber criminals will use lies and manipulation to trick someone into revealing their personal information to them (i.e. phishing). This involves them posing as a represenative from a legitimate organization and requiring this data to solve some kind of fictitious problem. Once they have revealed it, is the point these individuals will utilize this to gain access to their bank accounts and possibly commit identity theft. In some cases, this can provide them with the ability to go into the database of large organizations and steal entire quantities of files. (Robinson, 2011) (Casey, 2011)

Skimmers are used to steal credit card information when someone is at a store or restaurant and it is out of the sight of the owner. This data is sold online to various criminal organizations. They will utilize it to take large sums of money, gain access to bank accounts or charge various goods / services to the individual. (Robinson, 2011) (Casey, 2011)

These different tools and techniques are showing how criminals and related organizations have become very sophisticated in committing cyber crime. This helps them to gain access to the data they need and to protect their locations / identities. When this happens, they can conduct their operations quickly and then move onto the next target without the fear of retribution. (Robinson, 2011) (Casey, 2011)


To protect firms and individuals against these kinds of issues; requires using a risk management plan that will take into account the overall nature of the threat and evolve with new challenges in the future. This will allow everyone to keep up with the latest tools and tactics utilized by cyber criminals. It is at this point when they reduce the odds of them being able to exploit their different vulnerabilities. (Vacca, 2010) (Solomon, 2008) (Gregg, 2010)

The best way to mitigate cyber crime is to utilize an all encompassing strategy that is focused on a number of areas. The most notable include: having multiple firewalls in place, restricting access to who is provided with sensitive information, limiting the amount of data that is stored on mobile devices and always being watchful for suspicious activity. Anyone who is using a combination of these elements; will be able to keep up with the threats they are facing and reduce the chances of them or their organization becoming the victims of cyber criminals. (Vacca, 2010) (Solomon, 2008) (Gregg, 2010)…

Sources Used in Documents:


Casey, E. (2011). Digital Evidence and Computer Crime. London: Academic.

Collins, a. (2012). Contemporary Security Studies. Oxford: Oxford University Press.

Gregg, M. (2010). Hacker Techniques, Tools and Incident Handling. Sudbury, MA: Jones and Bartlett.

Gryzbowski, K. (2012). An Examination of Cyber Crime and Cyber Crime Research. (Unpublished doctoral dissertation). Arizona State University, Scottsdale.

Cite this Document:

"It Risk Management -- Cyber" (2013, June 17) Retrieved April 11, 2021, from

"It Risk Management -- Cyber" 17 June 2013. Web.11 April. 2021. <>

"It Risk Management -- Cyber", 17 June 2013, Accessed.11 April. 2021,

Related Documents
As You Like It the Version Chosen
Words: 376 Length: 1 Pages Topic: Sports - Women Paper #: 40136236

As You Like it The version chosen is the 1936 as You Like it directed by Paul Czinner and starring Laurence Olivier as Orlando and Elisabeth Berner as Rosalind. In Shakespeare's day all the women's parts were played by men which makes the whole women disguised as men thing more believable. Is it less believable to see women playing women who are then disguised as men? Though the story is set in France,

As You Like It One of William
Words: 1646 Length: 5 Pages Topic: Women's Issues - Sexuality Paper #: 28395402

As You Like it One of William Shakespeare's more accessible plays, As You Like It is a delightful romantic comedy that tickles audiences' hearts as much today as it did in Elizabethan England. The play's themes and characters cross conventional boundaries of gender, morality, and class. In fact, central to As You Like It is a celebration of conflict, contrast, and contradiction. The trappings of courtly life are pitted against the

Pastoral/Forest Scenes 'As You Like It Is
Words: 1848 Length: 7 Pages Topic: Literature Paper #: 90075858

Pastoral/Forest Scenes 'As you like it" is one of the darker comedies of Shakespeare's and is largely based on pastoral tradition that was very popular during Renaissance. This comedy especially draws inspiration from a pastoral novel by Thomas Lodge entitled "Rosalynde." Published in 1590, this romance by Lodge provided all the material that Shakespeare later needed for his own comedy including the exiled ruler, the animosity between two brothers, young

William Shakespeare's As You Like It William
Words: 580 Length: 2 Pages Topic: Literature Paper #: 44667303

William Shakespeare's As You Like It William Shakespeare's play As You Like It is probably one of his best comedy plays. It has been said that Shakespeare's plays illustrate the many sides of his genius and humor. (Abrams 867) In As You Like It, Shakespeare introduces many different themes and ideas for the audience to ponder and skillfully develops the characters to create a thought-provoking play. As You Like It is

Why Do You Think It
Words: 396 Length: 1 Pages Topic: Education - Computers Paper #: 83722436

There are also those nations so hungry for economic growth that they embrace any type of commerce activity, and this has been the case in China for example, which does not police against spamming. The U.S. government on the other hand has been aggressive about prosecuting spammers and sending them to prison. You are a fairly small company: a) Should you use a firewall? Yes, most definitely, as any hacker could get to your company's record, even

Organization's Lobbyist, What Would You Like to
Words: 732 Length: 2 Pages Topic: Government Paper #: 92033531

organization's lobbyist, what would you like to see done by the Federal government that would be of help to your organization? This could be what the government could do or what they could stop doing. It can be all fiscal, all monetary, or a mix of each type of policy. As a lobbyist it is not your job to be concerned with the deficit, or the environment, or the