Cybercrimes

Cybercrimecan be described in several ways. For instance, it is seen as anycriminal activity involving a computer as well as a network. Thecomputer system may be utilized in performing the crime or can be thetarget. It as a fast-growing criminal area with criminals exploitingthe convenience, anonymity and speed of the internet to performvarious kinds of crimes that go beyond physical or virtual borders.Apart from describing cybercrime, this paper will look to analyzeSartin’s article effectively. From the article, we will establishthe kinds of cybercrimes across the globe. As per the characteristicsestablished, it will be clear whether the crimes fit to be consideredas cybercrime activities.

Onekind of cybercrime mentioned is hacktivism. Hacktivism can be definedas the action of breaking or rather hacking into someone-else’scomputer system with the aim of acquiring social, political oreconomic gain. The individual happens to be socially or politicallymotivated to perform the act. The norm is on the rise, with manyindividuals performing the same mostly for social and political gain.Companies also utilize the same to acquire competitor’s detailswhether its market strategy or any other unauthorized data. At asocial aspect, individuals may invade another’s personalinformation with the aim of causing harm in different ways.

Cyberespionage on the other hand can be described as the act or practiceof acquiring secrets without the owner’s permission. Theinformation could be sensitive, propriety, classified nature orpersonal. The act is normally performed against competitors,governments, enemies among others, with the aims also varying frompolitical to military advantage. Countries venture into spying ontheir counterparts to gain military advantage. For instance, Chinesemilitary may be monitoring United States military proceedings toestablish their strengths or extent of weaponry possesses within thecountry. By doing so, they make their own with the aim of being morepowerful than the other. It is a common thing across the globe,whereby countries spy on others to keep track of their counterpart’smilitary strengths.

Asmentioned in the article, most of these crimes are state funded hencemay go along without detection. It is also a trendy norm to useremote access facilities to initiate crimes without necessarily beingnoticed. The rise of cybercrimes is quite evident. For instance,Sartin realized that many organizations complained of breach of datasecurity within the first 6 to 7 months of operation. It is commonfor criminals to target certain vulnerable areas across differentorganizations even at the beginning of operations.

Manyorganizations spend much on countering cybercrimes with most of themthinking it is quite complex. But current research indicates thatcriminals target least expected places that are easy to target. Therehappens to be a growing trend in insider involvement in cybercrimes.This is where particular information that is secret to the company isrelayed to unauthorized persons. For instance, several companies hadcomplained of fraud concerning credit cards. Though suspicion wasraised towards the company providing electronic payment software, itwas not necessarily the case. In this particular case, unauthorizedpersons could make duplicate cards and then use them to procure goodsand services, often giving false information. As it was established,for one to possess a falsified card, he/she ought to have access todata entailed within the magnetic stripe at the back of the card.Such information could be due to close association of leakage ofinformation. The fact that magnetic stripes data were involved in thebreach meant that the data was most probably stored despite standardsbeing against this act. The extent of crime outlined how deep thenorm has crept.

Inaccordance to Sartin, more has to be done to curb these growingtrends. With the continuous evolution of technology, crimes are alsoon the rise taking advantage of diverse shortcomings. It is thereforevital to improve on the response to such cases. Detection mechanismsought to improve as well as the punishments given to offenders. Forexample, in India, cybercrimeassociated intelligence sharing is undertaken with cautiousness orrather seriously.

Inevery organization, one must have several personnel managing cybersecurity of a well ramped up infrastructure. The staff must also bewell educated on the issue so as to avoid such cases. In case theyhappen, then the staff should take action quickly. It is thereforeessential to outline the probable issues and inform the staffaccordingly so that when situation like that happen, they will bequick to report. As per Sartin’s assumptions, most companies investin the wrong aspect i.e. concentrate on sophisticated matters andforget the basic areas. In that respect, companies should concentratemore on the basic security infrastructures to effectively counter thecrimes.

Inconclusion, Sartin’s article outlines the current trends incybercrimes such as hacktivismand cyber espionage. With several cases of this type of cybercrime,there is need to instill mechanisms that counter the same. Techniquesto detect and counter the same also need to improve to keep up withthe ever evolving technological world.

References

Sartin, B. (2012, February 15). Cybercrime detection techniques need to improve. Retrieved from Cybercrime detection techniques need to improve: http://www.business-standard.com/article/technology/cybercrime-detection-techniques-need-to-improve-bryan-sartin-verizon-112021503002_1.html