Chat with us, powered by LiveChat See edited document attached comments along side page in blue Echoles 6 Students Name: Antwan Echole | Max paper
  

See edited document attached comments along side page in blue

Echoles 6

Students Name: Antwan Echoles

Professor’s Name: Mr. Welch

Course Title: ENG-111-2905

Date: 15 November 2021

Cybercrime and Its Implications

Cybercrimes are malicious activities conducted by cybercriminals by using or targeting a computer. Cybercrimes involve activities like interference of system interceptions and data that affect networks and systems. Cybercriminals infect devices with viruses and malware to destroy them or cease them from operating. Cybercriminals can also use computers to conduct other crimes that require using systems to spread malware and unlawful information. Cybercriminals can be highly skilled using organized and advanced techniques or just novice hackers (Malby et al.). The main types of cybercrimes are phishing, malware attacks, distributed Dos attacks, credit card fraud, ransom ware attacks, internet fraud, identity fraud, corporate data, and cyber extortion. Cybercrimes are challenging the world; cybercriminals are advancing on their techniques and posing significant challenges to peoples’ finances and reputation and extorting businesses.

Cybercrimes over the internet are advancing substantively due to developments in technology in today’s world. They have forced businesses to get into long-term debts due to online identity thefts and ransom wares. Companies have had their files corrupted, activities have been disrupted, and others closed indefinitely. Cybercrimes do not occur in a void, they are well planned and distributed in nature, and some depend on others to perform their crimes (Ali et al.). Cybercriminals use various attack aspects to conduct cybercrimes; they seek new systems and techniques to execute their tasks. Computer-based variations like phishing and ransom ware attacks commonly used by attackers are easy to conduct because of anonymity, convenience, and internet speed. Most cybercriminals do not perform the crimes in their countries; they conduct their activities in countries with frail or no cybercrime rules to avoid being detected. The internet has not allowed cybercriminals to evolve but has enabled them to upgrade their game; malware kits are available at cheap prices allowing novices to enter the world of crime.

Cybercrimes have a negative effect on technological infrastructure because attackers prey on their users for financial gain. Attackers achieve this by targeting computers and contaminating them with computer viruses; the viruses are extended to other networks which target users’ confidential information. Cybercriminals embezzle funds from banks; the criminals aim at financial organizations to get class security systems. The attackers also earn cash from ransom; the attackers look for an organization that perform majority of its operations on the internet and takes down their sites; the company is given a demand to pay a certain amount of money for their system to get restored. Studies show that in ransom attacks, coercion claims range between $10 000 to $50 000. According to Yury Connolly, victims of ransom ware attacks opt to pay the ransoms to avoid the repercussions of their websites being taken down.

In their bid to get finances, cybercriminals steal credit cards; the stolen credit card particulars are then used by the attackers for their purchases. Attackers use impersonating to make money; attackers impersonate legitimate sellers and sell fake and non-existent items. Cybercriminals convince the victims to buy their counterfeit goods and disappear without delivering the services and goods (Kyung-shick and Lee). Cybercriminals also make money through crypto currencies; they use crypto jacking to get cash at the cost of victims without knowing they are taking part in the mining process. They use malware to take control of victims display program and use their computers to get finances without their comprehension.

Cybercrimes have a negative effect on people, organizations, and governments because it uses malware; malware is malicious software designs meant to harm and export any programmable service, network, or device. Cybercriminals use malware to control computers then launch denial-of-service attacks, infect PCs, and use them to get crypto currencies (Nurse). The main types of malwares are scare ware, viruses, Trojans, spyware, and fireless malware. For example, the home depots system was breached using malware; the breach exposed information and data for over fifty million credit cards. The attackers installed malware using a vendor’s username and password and assessed the company’s system. They positioned the malware on the organizations system of sales; it meant anyone who was swiping their credit cards was giving out their private credentials to the criminals.

Cybercriminals use malware by sending it to computers; targeted victims run them without knowing they are infected. The malware holds back until users connect to a bank’s service; they take over and steal the vital particulars. The hidden malware lets the victims access their accounts, do authenticating, and then take over the system (Nurse). Through the malware, the attackers command transfer of money into their accounts, they hide the transactions for the user not to know their actual balance immediately. Internet users can protect themselves from malware by protecting their devices, keeping operation systems updated, and being careful online by avoiding unknown links and being selective in the sites they visit. They should be keen on the links they download operating system purchases and perform regular checks on their computers, bank accounts, and credit cards.

Cybercrime has an adverse impact in the view of the indispensability of the internet in everyday life, especially on the loss of reputation due to revealed persona information. Cybercriminals target standard and prominent people, steal their documents, and use them to extort people. They send viruses to the targeted victim’s computers and get their credentials; after that, they analyze all the sensitive information from the individuals and use it for extortion (Ali et al.). Some might be required to pay money for their information not to be publicized. Those who do not pay the required funds have their sensitive information like health status, conversations, or sensitive pictures publicized. Despite sending the required amount of money to save their reputation, some attackers keep the information to extort them to get finances whenever they do not have money. Due to the acts, some people get depressed and traumatized, some are fired from their jobs, and others opt to commit suicide.

The counterargument on cybercriminals is that most cybercrime victims do not take enough defenses on cybercrimes. I refute the claims because cybercriminals are advancing on the strategies they are using to attack by day. People, organizations, and governments are taking all the necessary steps to protect themselves from cybercrimes, but the attackers are a step ahead. As businesses continue to digitize and people get more connected to the internet, cybercriminals are looking for more ways to enter their networks. Despite technology struggling to stay on top of cybercrimes, cybercriminals are changing techniques and using all ways to avoid detection.

The world is digitizing; although not everyone is a victim of cybercrimes, eventually, everyone will be at risk. Technology is advancing, and cybercriminals are enhancing the techniques they use to get their victims. Cybercriminals are using the internet to earn money, breach national security systems, taint people’s reputations, cause electrical blackouts and failure of military equipment. Defense starts with individuals; being aware of cybercriminals’ methods to attack will give people a strong defense against attacks. Cybercrimes are not going to be eradicated anytime soon; they are deepening their roots by day. However, with a combination of security awareness and advancing technology, cybercriminal threats can be managed.

Works Cited

ALI, NI, et al. “Cybercrime an emerging challenge for internet users: An overview.” Sindh University Research Journal (Science Series) 50.3D. 2018: 55-58. https://www.researchgate.net/publication/333132250_Cybercrime_an_emerging_challenge_for_internet_users_An_overview.

Choi, Kyung-shick, and Claire Seungeun Lee. “The present and future of cybercrime, cyberterrorism, and cybersecurity.” International Journal of Cybersecurity Intelligence & Cybercrime 1.1. 2018: 14. https://www.researchgate.net/publication/328433593_The_Present_and_Future_of_Cybercrime_Cyberterrorism_and_Cybersecurity.

Malby, Steven, et al. “Comprehensive study on cybercrime.” United Nations Office on Drugs and Crime, Tech. Rep. 2013. https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf

Nurse, Jason RC. “Cybercrime and you: How criminals attack and the human factors that they seek to exploit.” arXiv preprint arXiv:1811.06624. 2018. https://www.researchgate.net/publication/328762019_Cybercrime_and_You_How_Criminals_Attack_and_the_Human_Factors_That_They_Seek_to_Exploit

Yuryna Connolly, Lena, et al. “An Empirical Study of Ransomware Attacks on Organizations: An Assessment of Severity and Salient Factors Affecting Vulnerability.” Journal of Cybersecurity, vol. 6, no. 1. 2020. Crossref, doi:10.1093/cybsec/tyaa023.

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

Paper Title: Week 5 English Draft

No. of Pages: 4

Paper Style: MLA Paper Type: Research

Taken English? Yes English as Second Language? No

Feedback Areas: Topic Development, Paper Format

Paper Goals: Please review my paper and post feedback. Thanks in advance. English 111 Assignment

Review Summary:

Hi Antwan,

My name is Maria, and I really enjoyed reading your essay today.

Strengths:

You did a really good job of utilizing specific examples as evidentiary information to support your claims about

cybercrime in this essay; this enabled you to write authoritatively about this topic. Additionally, you did a really

good job of employing an active writing voice in this essay; this enabled you to communicate your ideas more

directly. Good work in this essay!

Areas for Improvement:

While you have written a strong thesis, you should utilize the topic sentence of each body paragraph to

directly address and support a different specific element of your thesis. In other words, you should

utilize the topic sentence of each body paragraph to propose a secondary argument that explicitly

supports the primary argument contained in the thesis. Doing this will enable you to reemphasize your

primary argument more consistently throughout your essay, and this will improve the overall

organization and focus of your essay. In this essay, you should use the topic sentence of each body

paragraph to identify a specific effect of cybercrime that was first introduced in your thesis. Additionally,

you should utilize the first sentence of the concluding paragraph to restate your thesis as this will

enable you to reemphasize your primary argument at the end of your essay before utilizing the

remainder of the conclusion to consolidate the information presented in the body paragraphs and to

bring your essay to an effective close. In this essay, you should use the first sentence of the concluding

paragraph to reiterate the specific effects of cybercrime.

You can also return to the Paper Center for additional reviews of your work. As always, feel free to

join a Live Tutoring session for immediate feedback, including for any questions that you may

have regarding the review of this paper.

Thanks for using NetTutor, and keep up the good work!

page 1 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

This is a strong and

specific thesis. Good work!

page 2 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

This paragraph is a

little long, and it

covers multiple

interrelated topics.

You should consider

separating this

longer paragraph

into several shorter

paragraphs, with

each shorter

paragraph serving

to examine a

different element of

the topic presented

in the longer

paragraph. Analyzing

interrelated, yet

unidentical,

elements of your

topic in separate

paragraphs will

improve the

organization of

your essay, in

addition to making

each individual

paragraph more

comprehensible

and digestible for

the reader.

page 3 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

While you

have written a

strong thesis,

you should

utilize the topic

sentence of

each body

paragraph to

directly address

and support a

different

specific element

of your thesis.

In other words,

you should

utilize the topic

sentence of

each body

paragraph to

propose a

secondary

argument that

explicitly

supports the

primary argument

contained in

the thesis.

Doing this will

enable you to

reemphasize

your primary

argument more

consistently

throughout

your essay,

and this will

improve the

overall organization

and focus of

your essay. In

this essay, you

should use the

topic sentence

of each body

paragraph to

identify a

specific effect

of cybercrime

that was first

introduced in

your thesis.

page 4 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

Additionally,

you should

utilize the

first sentence

of the concluding

paragraph to

restate your

thesis as this

will enable

you to reemphasize

your primary

argument at

the end of

your essay

before utilizing

the remainder

of the conclusion

to consolidate

the information

presented in

the body

paragraphs

and to bring

your essay

to an effective

close. In this

essay, you

should use

the first

sentence of

the concluding

paragraph to

reiterate the

specific

effects of

cybercrime.

page 5 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021
page 6 / 7

Reviewed Paper: ntp1350785 – Mon Nov 15 22:28:38 EST 2021

Powered by TCPDF (www.tcpdf.org)

page 7 / 7

error: Content is protected !!