Challenges and Solutions to Applying Technology in dealing with Cybercrime

930 words | 4 page(s)

Securing and managing information in contemporary times when computers and the internet have become integral aspects of life is becoming increasingly difficult. It is difficult to secure private and sensitive information from the access of unauthorized third parties because hackers continue to be innovative in their illegal activities. Advances in information and communication technologies have resulted in increased cyber activities. Currently more people and groups than before are storing their data online and engaging in online trade. This exposes their information to cybercriminals who are able to use various tools and strategies to access and use the information to pursue their ulterior motives. Crime that is conducted on and via computers and the internet is referred to as cybercrime. The threat of cybercrime has been identified as being very comprehensive because cybercrime targets governments, institutions, business organizations, and individuals. In present times, it has become apparent that cybercrime is becoming an organized form of crime and even a form of terrorism. The difficulty in data management of information that is stored in computers is compounded by the fact that the security environment is also constantly changing. Conventional law enforcement methods are highly ineffective when it comes to mitigating cybercrime and that is why technology needs to be used to combat cybercrime, but applying technology in fighting cybercrime is associated with various challenges and opportunities. The challenges and opportunities are the main focus point of this study.

One of the main challenges associated with using technology to combat cybercrime is that cybercrimes are conducted via technology platforms. Furthermore, cybercriminals continuously use developing technologies to find divisive and cunning ways of accessing and using information that they are not authorized to access. Cybercriminals commonly use private information of individuals and organizations to accrue financial gain and or blackmail the owners of the information. The criminals use sophisticated technology to negatively influence internet users to provide their personal information. A considerable challenge with regards to this aspect is that the development of technology to combat a particular strategy or tool that cybercriminals use will ultimately result in the criminals developing alternative approaches and tools to continue engaging in their illegal activities.

puzzles puzzles
Your 20% discount here.

Use your promo and get a custom paper on
"Challenges and Solutions to Applying Technology in dealing with Cybercrime".

Order Now
Promocode: custom20

Possible solutions to this challenge include encouraging internet users to use constantly evolving and changing passwords so that the cybercriminals are not able to keep up with the particular password which the internet users are using at particular period of time. Another approach is actively targeting concealed online forums so as to cause interruptions to the tools that cybercriminals use to access unauthorized information. Another approach is to investigate and identify malicious code writers and ICT specialist web hosts and preventing them from engaging in illegal activities.

Another considerable challenge in relation to using technology to deal with cybercrime is differentiating between cybercrime prevention and privacy. It is worth noting that many internet users have been duped into willing providing their security information to cybercriminals who pretend to offer protection services. They pretend to be preventing crime and in the process they invade the privacy of the internet users. This has resulted in the need for a clear distinction between cybercrime prevention and privacy because cybercrime prevention is not intended to adversely affect the privacy of users. Safeguarding privacy and ensuring that cybercrime prevention activities do not impact on the privacy of internet users involves using approaches and technologies that facilitate encryption. Encryption is a strategy that can be used to conceal cyber content and ensure that it is only visible to authorized individuals through means of authentication.

Authentication has in the recent past been identified as one of the most effective ways of evaluating the authenticity and identities of users before accessing them to concealed information. Another strategy is the use of steganographic techniques which involve hiding sensitive information within other file systems so that they can not easily be detected and used by unauthorized third parties. The approach is used to ensure that sensitive private data is stored as secret data so that it cannot be accessed by unauthorized individuals. Apart from encryption and use of steganographic techniques, use of watermarking and fingerprinting technologies can be used to limit the access to sensitive private information. Using such approaches would guarantee that information is only accessed by individuals who are able to prove authorship of the data, thus minimizing infringements of the data owner’s rights to the information.

In present times when cybercrime continues to increase at exponential rates, it is important for internet users to be sensitized on the importance of using source codes that are published publicly to help minimize access by third parties with ulterior motives. Since there are ever increasing emerging cyber threats which are sophisticated, it is important to continually develop new technologies and tools that identify and mitigate those threats. This involves planning for next generation security technologies while always evaluating the cyber world to identify trends of cybercrime activity. This is necessary because it makes it possible to develop technologies that integrated technology architecture and infrastructure roadmaps to actual as well as potential threats. The collaboration with various stakeholders will help ensure that the technologies are user friendly and that they do not invade the privacy of users, plus they result in cybercriminals being identified and charged.

    References
  • Kshetri, N. (2013). Cybercrime and cybersecurity in the global south. Basingstoke : Palgrave Macmillan.
  • Sterling, B. (2016). Hacker Crackdown. n.a.: Createspace Independent Publishing Platform.
  • Tropina, T., & Callanan, C. (2015). Self- and co-regulation in cybercrime, cybersecurity and national security. Cham: Springer.
  • Waschke, M. (2016). Personal cybersecurity : how to avoid and recover from cybercrime. Apress, New York, NY : Distributed by Springer .

puzzles puzzles
Attract Only the Top Grades

Have a team of vetted experts take you to the top, with professionally written papers in every area of study.

Order Now