Analysis Of Cyber Crime

526 words | 2 page(s)

Cybercrime is a form crime committed using a computer and the Internet. Some of the most common types include computer viruses and phishing, identity theft, and at a corporate level, and computer hacking of a database. Business are increasingly storing more confidential data and information in cloud services and other enterprise storage infrastructures, hence, there is need to come up with more sophisticated security strategies and practices to ensure such data and information is secured from cyber criminals (Brenner, 2010). Even though large organizations have established mechanisms to deter the threats, several organizations have not put in place initiatives to counter the threats of cyber criminals. Organizations should create ways such as proper management of email security and validating potential threats, enforcing strict password policies, and training employees to understand warning methods to secure their data and information systems infrastructure.

One way organizations can employ to protect themselves from cybercrime is proper management of email security and validating potential threats. An organization should consider deterring break-ins from being taken by opportunity theft. This can be accomplished by ensuring that the company emails as well as communications are encrypted. The practice will force a cybercriminal to use another layer of protection to fight through which will probably fail to succeed. Encryption is one of the major security practices employed by various organizations (Brenner, 2010). Encryption ensures data and information is communicated in a form which is unreadable through the transmission medium, and it is then decrypted at the destination for the receiver to read the information.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Analysis Of Cyber Crime".

Order Now
Promocode: custom20

The second way organizations can employ to protect themselves from cybercrime is by enforcing strict password policies. Organizations secure the most vulnerable assets, employees. Employees should be trained on the importance of making use of smart and secure passwords as one of the simple to deter cyber criminals from accessing the company data and information (Gragido, 2011). Even though complex, longer, and difficult passwords seem to be a hassle for employees, an organization should develop a policy to mandate them to do so. Sharing of passwords across several platforms should be prohibited and passwords should be changed often, after a minimum of three months. Furthermore, passwords should not be stored on sticky notes or in the cloud but the organization should consider using password management software platform like PassPack, LastPass, and 1Password.

The third way is to providing training for employees on the various warning signs. It is important to train employees for them to understand the warning signs of phishing scam or harmful email. Even though email providers are constantly improving their procedures to detect any harmful emails and spotting the potential threats before they are delivered, some trickier scams mat still enter into the employees’ inbox (Gragido, 2011). The emails are disguised as an email from a trusted client or a bran that is recognizable, but they are instead delivered to trick employees and obtain important company details. Taking advantages of spyware, malware, and firewall software programs can significantly help in deterring this cybercrime and ensure company data and information is secure.

    References
  • Brenner, S. (2010). Cybercrime: Criminal Threats from Cyberspace. ABC-CLIO
  • Gragido, W. (2011). Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats. Newnes

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now