Week Six Reflective Essay
Darkenstz Corneille
Regis University
4/29/20
Week Six Reflective Essay
Cybercrime refers to the application of computers with the intent of committing an illegal activity such as fraud, child pornography, violating privacy, among others. Additionally, I noted the primary and most common cybercrimes involve online harassment, invasion of privacy, identity theft, phishing scams, as well as cyberstalking. Some practices subject internet users to extreme suffering and danger (Losavio, Chow, Koltay, & James, 2018). The relationship between cybercrime and internet vulnerability is that internet vulnerability augments the chances of cybercrime. Any flaw in the system may subject the system to attack by the hackers. Therefore, internet vulnerability is the flaw that is present on the internet that subject user of the internet to risks such as attacks by hackers. Cybercrime is committed as a result of the existence of internet vulnerability, which exposes one to the attacks.
Trespass refers to the penetration of a computer to gain access to restricted information or data without legitimate authorization. On the other hand, unauthorized access refers to when one gains access to a controlled system by using logins or data of another person who has the authority to access the restricted system (Losavio et al., 2018). Lessing’s framework deifies four essential modalities, which include laws, norms, the market, and architecture. These modalities can be applied by different actors to help in the management of cybercrime.
The layers of defense are anchored on three critical areas, namely physical, technical, and administration. The multilayer approach is meant to offer backup in the event one fails; the other layer picks up the task. The three elements of security work towards ensuring that network security controls, antivirus software, data integrity analysis, behavioral analysis, are taken into consideration since they form the datum for ensuring the security of the systems and protecting an organization form cyberattacks (Yar & Steinmetz, 2019). Therefore, to build an effective layer of defense, I will ensure that these critical elements are applied to the later.
Moreover, I learned about the reality of cybercrime and its impact. I now understand that any little vulnerability can create room for the commission of cybercrime. Loopholes in electronic security have facilitated the loss of finances and the reputation of firms through leakage of private information to malicious people (Losavio et al., 2018). “Hacktivists” often enjoy breaching and trespassing private electronic boundaries for fun. I appreciate their roles in helping organizations to strengthen their security features to reduce the commission of cybercrime. Furthermore, I understand the requirements and parameters to consider in the protection and defense against cyber attacks. Most importantly is that as an information technology professional, it is always essential to assess and evaluate the vulnerabilities of the electronic systems (Yar & Steinmetz, 2019). The inspection would facilitate earlier detection of possible system weaknesses that can be used by hackers to access private data. Similarly, it was clear that data protection begins with the users, who must be trained well on how to use systems safely and responsibly.
Consequently, cybercrime entails the use of computer to target other computers for criminal purposes. It should be noted that, majority of the cybercrimes are targeted at achieving financial fraud. The activities involved in cybercrime are diverse and evolve every day. It cannot be easy to implement one measure that could work against all forms of cybercrime. The forms of cybercrime include malware, ransom ware and identity fraud all aimed at either financial losses or damage to the computer systems (Losavio et al., 2018). The consequences of malware include interception of data, and interferences of computer systems that eventually lower system integrity, affect copyright entitlements and infringing the privacy rights of people. Given the contemporary and unprecedented digitization of data, cybercrime protection is an area that should be given priority.
References
Losavio, M. M., Chow, K. P., Koltay, A., & James, J. (2018). The Internet of Things and the Smart City: Legal challenges with digital forensics, privacy, and security. Security and Privacy, 1(3), e23.
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society. SAGE Publications Limited.