This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks.
The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software. This presents a new threat to computer users that must be addressed, hence it is more important than ever that effective methods of prevention and control are designed to prevent future data loss.
Methodology
Design of the Study
The research study takes into consideration multiple factors when deciding the methodology. The history of viruses, positive and negative effects, organizational impacts, etc. will all be examined. These factors will be measured using a variety of techniques including field research that will involve collecting data…...
mlaReferences
Hickman, J.R. (1995). "Viruses: New strains, new solutions." ABA Banking Journal,
Hopkins, W. (000). "Quantitative Research." Sports Science. 30, October 2005: http://www.sportsci.org/jour/0001/wghdesign.html
Horn, R.V. (2003). "Technology: Prudent computing." Phi Delta Kapan, 85(3): 183.
Hunton, J.E. (1998). "Facts and fables about computer viruses." Journal of Accountancy,
Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism.
Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth, cyberterror can be launched and managed remotely and fifth, computer terrorism can garner instant and widespread media attention. Cyberterrorism is not only in the province of international terrorist organizations but may also be used by fanatical religious groups or even by disgruntled employess. Using computer terrorism can also become an adjunct to traditional forms of terror like bombs.
The National Security Agency (NSA) has investigated vulnerabilities in their own systems and have hired hackers to expose weaknesses in their systems. Governmental…...
mlaReferences
Weimann, G. (2004). Cyberterrorism: How Real Is the Threat? United States Institute of Peace. Retrieved April 17, 2007 at http://www.usip.org/pubs/specialreports/sr119.html
Essay Topic Examples
1. The Evolution and Impact of Computer Viruses on Cybersecurity:
This essay explores the history of computer viruses, detailing their progression from simple self-replicating programs to complex malware that can cause significant damage to digital infrastructure, steal sensitive data, and compromise personal information. It discusses the impacts on individuals, businesses, and governments, and the growing importance of robust cybersecurity measures.
2. Cyber Fraud and Its Effect on the Global Economy:
The focus of this essay is the prevalence and variety of cyber fraud, including phishing, identity theft, and financial scams, analyzing how these crimes undermine trust in digital transactions. It examines the economic ramifications for both consumers and organizations, highlighting the need for greater awareness and prevention strategies.
3. The Ethical Implications of Computer Hacking:
This topic invites discussion around the moral considerations of hacking, distinguishing between different motivations such as 'black hat', 'white hat', and 'grey hat' hackers. The essay would delve…...
mlaPrimary Sources
United States. National Institute of Justice. \"Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats.\" Washington, D.C.: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2007. Print.
United States. Federal Bureau of Investigation. \"Internet Crime Report.\" IC3 Annual Report. Washington, D.C., 2021. Web.European Union Agency for Law Enforcement Cooperation (Europol). \"Internet Organised Crime Threat Assessment (IOCTA).\" The Hague, Netherlands: Europol, 2020. Web.United States. Congress. Senate. Committee on the Judiciary. \"Law Enforcement Tools and Technologies for Investigating Cyber Attacks: A Report to Congress from the Attorney General.\" Washington: U.S. G.P.O., 2003. Print.United States. Congress. House. Committee on the Judiciary. \"Hearing on Cyber Crimes and the Law: Updating the Computer Fraud and Abuse Act.\" 113th Cong., 1st sess. H. Hrg. Washington: U.S. G.P.O., 2013. Web.
Cyber Terrorism: The Greatest isk in the U.S.
Tremendous technological advancements have been made in the last few decades. Today, humans depend more on computer networks and information technology (IT) systems than on other means for information. From business to government, computer networks are relied upon to store, process, retrieve, and transfer critical information. Increased dependence on computer networks has, however, posed a major threat. Cyber terrorism is now arguably the biggest threat facing the U.S. (Harress, 2014; Thomas, 2016). Attacks against computer networks via computer viruses, worms, malware, and hacking have become increasingly common. The attacks are directed to information systems and infrastructures that support critical processes such as defense, transportation, banking, and energy production. This threatens the country's social, economic, and political stability. Nonetheless, there are often assertions that the risk of cyber terrorism is not as pervasive or substantial as often portrayed. Though there could be some truth…...
mlaReferences
Caplan, N. (2013). Cyber War: The Challenge to National Security. Global Security Studies, 4(1), 93-115.
Chen, T., Jarvis, L., & Macdonald, S. (2014). Cyberterrorism: understanding, assessment, and response. New York: Springer.
Geers, K. (2012). Strategic Cyber Defense: Which Way Forward? Journal of Homeland Security & Emergency Management, 9(1), 1-10.
Harress, C. (2014, February 2). Obama says cyberterrorism is country's biggest threat, U.S. government assembles "cyber warriors." International Business Times. Retrieved from: government-assembles-cyber-warriors-1556337http://www.ibtimes.com/obama-says-cyberterrorism-countrys-biggest-threat-us -
Computer Fraud and Abuse Act
Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to abuse, the study identifies ways of protecting and enhancing their integrity.
Types of information systems that that hold data
Computers
Computers do their primary work in parts that are not visible when using them. To do this, a control center that converts data input to output must be present. All this functions are done by the central processing unit (CPU) a highly complicated set of electric circuits that intertwine to store and achieve program instructions. Most computers regardless of the size must contain…...
mlaReferences
Adikesavan, T.A. (2014). Management Information Systems Best Practices and Applications in Business. New Delhi: PHI Learning Pvt. Ltd.
Bradley, T. (2006). Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security: Everyone's Guide to Email, Internet, and Wireless Security. New York: Syngress
Khosrowpour M. (2006). Emerging Trends and Challenges in Information Technology Management: 2006 Information Resources Management Association International Conference, Washington, DC, USA, May 21-24, 2006 Volume 1. Washington: Idea Group Inc. (IGI)
Kim, D. & Solomon, M. (2010). Fundamentals of Information Systems Security. New York: Jones & Bartlett Learning
Essay Topic Examples
1. The Evolution of Cybercrime:
Explore how computer crimes have evolved from simple hacking to sophisticated cyber-attacks, detailing the technological advancements that have facilitated this growth.
2. Legal Frameworks and Computer Crimes:
Discuss the development of laws and regulations aimed at combating computer crimes, analyzing their effectiveness and areas where they fall short.
3. sychological rofile of Cybercriminals:
Examine the motivations, backgrounds, and psychological traits common among individuals who commit computer crimes.
4. Cybersecurity Measures Against Computer Crimes:
Evaluate various cybersecurity strategies and technologies designed to prevent, detect, and respond to computer crimes.
5. The Impact of Computer Crimes on Society:
Analyze how computer crimes affect individuals, businesses, and governments, including economic impacts, privacy issues, and societal trust.
Essay Title Examples
1. "Navigating the Dark Web: A Journey into Cybercrime"
2. "From Hackers to Cyberterrorists: The Spectrum of Digital Offenders"
3. "The Digital Battlefield: Cybercrime in the 21st Century"
4. "Legal Labyrinths: The Challenge of rosecuting Cybercrime"
5. "Cybersecurity's Achilles Heel: Human Error…...
mlaPrimary Sources
Primary SourcesComputer Crime: A Crimefighter\'s HandbookMLA Citation: Icove, David J., et al. Computer Crime: A Crimefighter\'s Handbook. O\'Reilly Media, 1995.The Art of Invisibility
MLA Citation: Mitnick, Kevin D. The Art of Invisibility. Little, Brown and Company, 2017.Cybercrime and SocietyMLA Citation: Yar, Majid. Cybercrime and Society. SAGE Publications, 2013.
The owner remarked about how important it is to guard one's system against viruses and intrusion. He went further to remark that there are programs that offer their services free of charge (partial programs or trial versions) to protect one's computer, but he recommends buying a program that offers full protection. This statement concluded the interview "Unfortunately my customers have often learned the importance of protecting their information the hard way; it is not something to be taken lightly." This statement makes a lot of sense. Too often a person will sit back thinking that it is impossible for something to happen to them, when in fact one should always be prepared for the unexpected. The owner of Company Xtreme reported that approximately 50% of his customers are individuals whom have had viruses on there computer. Among this 50%, they also have spyware, which often may allow strangers access…...
Contending With Cybercrime Issues
Attacks and Malware
There are numerous laws pertaining to identity theft, privacy, and cybercrime. Prior to designating those laws and their ramifications for the parties involved with a breach, it is sapient to provide a brief overview of the correlation between these three facets of laws. One of the more common means of engaging in identity theft is through the means of cybercrime, in which individuals typically hack into a computerized systems and take personally identifiable information of others and use it for their own illicit purposes. Additionally, such crimes intrinsically invade the privacy of others and intrude upon that privacy by preventing individuals to keep personally identifiable information and other aspects of their lives private.
One of the most salient of the laws relating to these three different aspects of theft in contemporary times is the Fair and Accurate Credit Transactions Act of 2003. This law not only…...
mlaReferences
North Carolina Department of Justice. (2005). Cooper proposes identity theft protection act of 2005. / Retrieved from http://www.ncdoj.gov
Business Messages
Send to:
Andrea, Tech. Rep., CIS
Copy To:
Janet, Supervisor,
Jack, Manager, CIS
Information Services
Potential Threat to Company IT Systems
Over the past few weeks, it has become increasingly evident to me that our company may be the target of a denial of service attack or other computer virus for which we may be ill-prepared today. In this regard, I have reviewed the company standing operating procedures concerning computer viruses in an attempt to determine what measures should be taken by whom and when. Unfortunately, the company's SOP does not even address denial of service threats and only mentions computer viruses in a tangential way.
To help address this apparent gap in the company's ability to respond to threats to the integrity of its IT systems, I believe we should form a task force immediately to develop appropriate responses in the event of a computer virus infection in general and a denial of service…...
Vandalism
Vandalism is a major concern because of the nature of the products manufactured by the organization and the high rate of theft generally associated with motor vehicles and motorcycles. It is recommended that the organization conduct a thorough perimeter and site security audit for the purposes of ensuring the maximum mitigation of any risks of vandalism and theft. To the extent that internal vandalism is a concern, it is recommended that the organization invest in security cameras to monitor critical areas. Additionally, employee physical access to specific areas on the grounds of the company should be restricted appropriately based on responsibilities. Likewise, it is recommended that different degrees of it system access be assigned to employees on the basis of need instead of allowing universal system access to all authorized it system users.
Computer Viruses
Modern it systems are inherently vulnerable to many types of malicious attempts at unauthorized infiltration and theft…...
Emergency Planning
Disasters that can critically compromise the accessibility of knowledge include floods, fires, earthquakes, hurricanes, employee sabotage, computer viruses, and theft. The effects of disasters can lengthen even after the restructure of physical damage. Simply, the earlier a business recovers from a disaster; it will experience lesser wide-ranging continuing effects of the disaster. Not only the thrashing of sales during a disaster is destructive for the company, "the loss of customers, vendors, inventory and employee records extend recovery times from weeks and months to years" (Carlson & Parker, 1998). However, if a company has a premeditated disaster recovery plan (DP), it can reduce the nuisance of a disaster, whereas inappropriate preparations can result in a business experiencing liquidation of its bank accounts (Carlson & Parker, 1998).
In the Information Technology industry, Disaster ecovery (D) security issues occur repeatedly. The critical security measures in the environment are frequently covered by the storage.…...
mlaReferences
Carlson, S.J., & Parker, D. (1998). Disaster Recovery Planning and Accounting Information Systems. Review of Business, 19(2), 10+. Retrieved July 21, 2012, from Questia database: http://www.questia.com/PM.qst?a=o&d=5001370062
Disaster Recovery Security: The Importance of Addressing Data Security Issues in DR Plans. (2011, January). Retrieved July 21, 2012 from http://searchdisasterrecovery.techtarget.com/feature/Disaster-recovery-security-The-importance-of-addressing-data-security-issues-in-DR-plans
O'Sullivan, K. (2010, September 23). Knowledge Continuity: Strategies, Approach & Tools. Retrieved July 21, 2012 from http://star-knowledge.com/websites/star-knowledge/skblog/?p=70
Warfare: An Overview
In today's age, traditional warfare, though a major player as we see in the Iraq war, has in some arenas taken a back seat to information warfare.
y definition, information warfare is the offensive and even defensive utilization of information and information systems to deny, exploit, corrupt or destroy an adversary's information, information-based processes, information systems and computer-based networks while protecting one's own. Parties use information warfare to gain military, public relations or economic advantage. (www.psycom.net)
Users of information technology are most often nation-states and corporations. For instance, by gaining access to a rival company's databases, a business can get a valuable advantage on price-points and supply chains. Countries can decide how much to spend on military equipment by discovering how much in military stocks adversary nations have.
One major focus recently on information warfare has been hackers. For instance, the most recent generation of mobile phones has proven vulnerable…...
mlaBibliography www.iwar.org.uk: The information warfare site.
www.psycom.net/iwar.2.html: Glossary of information warfare terms.
www.fas.org/irp/wwwinfo.html: Web source of information warfare sites.
The increasing skill of these terrorists in using cyberspace has led some officials to believe that they are on the point of using computers for increasing bloodshed. This new threat is not similar to hackers' earlier using computers for passing viruses and worms. This has now reached a level of being able to reach the meeting point of computers and physical structures controlled by computers. The belief of analysts in U.S. is that they may try to disable or control floodgates in dams or electrical stations handling large quantities of power and through them destroy lives and property around them.
Though there is not much evidence, they believe that al Qaeda may be using these capacities with other weapons like explosives. The al Qaeda is known to have capacity to use other sites for their own benefit, and al Qaeda laptop in Afghanistan had visited the French site of Anonymous…...
mlaWorks Cited
Cyber-terrorism. (30 April, 2005) Wikipedia, the free encyclopedia. Retrieved at on 14 May, 2005http://en.wikipedia.org/wiki/Cyber-terrorismAccessed
Gellman, Barton. (June 27, 2002) "Cyber-Attacks by Al Qaeda Feared" Washington Post. P: A01. Retrieved at on 14 May, 2005http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26?language=printerAccessed
Lewis, James a. (December, 2002) "Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats" Center for Strategic and International Studies. Retrieved at Accessed on 14 May, 2005http://www.csis.org/tech/0211_lewis.pdf .
O' Neil, Michael J. (2001) "Cyber-Terrorism: Case Study" Excerpt from Terrorism and the Law, by Yonah Alexander and Edgar H. Brenner, Editors. Transnational Publishers, Inc. Retrieved at Accessed on 14 May, 2005http://www.terrorismcentral.com/Library/Teasers/ONeil.CyberT.html.
OSIIT
An analysis of IT policy transformation
The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia systems, and optoelectronic devices. The company is also represented by three subsidiary divisions in offices and plants dedicated to the brands, apiscan Systems, OSI Optoelectronics and SpaceLabs Healthcare.
In 2010, OSI, Inc. had sales of $595 million with net income of over $25 million. As of June 2010, the company was comprised of 2,460 personnel globally. The parent company provides oversight and fiscal control to the different divisions, and is connected through its virtual network world-wide intranet system; with external integration…...
mlaReferences
Allen, J. (2005). Governing for Security: Project Stakeholders Interests. News at SEI. Retrieved on 5SEPT10 from http://www.sei.cmu.edu/library/abstracts/news-at-sei/securitymatters20054.cfm
Computer Misuse Law, 2006. Parliament UK. Retrieved from: http://www.publications.parliament.uk/pa/cm200809/cmhansrd/cm090916/text/90916w0015.htm#09091614000131
Diver, S. (2006). Information Security Policy -- A Development Guide for Large and Small Companies. SANS Institute InfoSec Reading Room. Retrieved on 30 Sept 10 from http://www.sans.org/reading_room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies_1331
Global IT Policy (2009) OSI, Inc.
Network Security and Why Use It
Security And Why Use It
The security of any network should be taken seriously. A network allows someone to share resources and information with others on the network. Networks allow for distribution of computer viruses, Trojans, human intruders, and employees can damage more than just one computer. To better understand the importance of network security, one needs to think of what might happen if all the data for a company that is stored in their servers vanishes. This scenario would cause losses that the company might never recover. Networks are divided into three main categories Internetwork (internet), Wide Area Networks (WAN) and Local Area Networks (LAN). These three categories of network require security to ensure that no malicious humans gain access, and no viruses attack the network.
To better understand network security, one needs to know what a network is. A network is defined by Hu, Myers,…...
mlaReferences
Hu, H., Myers, S., Colizza, V., Vespignani, A., & Parisi, G. (2009). WiFi Networks and Malware Epidemiology. Proceedings of the National Academy of Sciences of the United States of America, 106(5), 1318-1323.
Krishna, V.A., & Victoire, T.A.A. (2011). A Descriptive Study on Firewall. [Article]. European Journal of Scientific Research, 63(3), 339-346.
Papaj, J., Dobos, L. u., & izmar, A. (2012). Opportunistic Networks and Security. [Article]. Journal of Electrical & Electronics Engineering, 5(1), 163-166.
Rao, B., & Parikh, M.A. (2003). Wireless Broadband Networks: The U.S. Experience. International Journal of Electronic Commerce, 8(1), 37-53.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now