Wednesday, December 11, 2019
Cybercrime and The Need of IT Security â⬠MyAssignmenthelp.com
Question: Discuss about the Cybercrime and The Need of IT Security. Answer: Cybercrime and the need of IT security professional Cybercrime is an unlawful commotion concerning computer and network. There are certain fraud cases that may impose by the criminal activities. Internet-connected activities are susceptible to crime and guide to unfair treatment as efficiently as the common corporal crimes. IT security persons are the responsible people who can take care of those problems and create a solution to the people. IT professionals need to so efficient so that they can tackle every situation for the cybercrime victimization. IT professionals use antivirus software and install certain server to strengthen the security policy of the device (Kshetri 2013). IT professionals have done their best to provide the best security in the professional field of work to migrate the cybercrime issues. Role of computer forensic Computer forensic investigates on solving the cybercrime to mitigate the hacking or terrorism process through the computer. They are not only working over this but also maintain the resolving process of crime like murder, organized crime, tax evasion, drug smuggling, robbery cases and terrorism. The roles of computer forensic are Collecting criminal evidence. Technological support to analyze the matter. Law enforcement. Retrieve information. Take the efficient step to mitigate the process. Expertise technique to solve the case. Computers have been usually well-known for being used in committing a crime but as the position has twisted and forensics has the periphery of using computer forensics to grasp criminals who considered not being an impression when committing definite crimes (Grabosky 2015). Important of IT security policies There are some acts that imposed over the cybercrime policies. By imposing those acts a South African government can do their best to prevent this kind of situations. Under the provision sections of 2(1), 3(1), 5(1), 6(1) or 7(1) (a) or (d) any person has found guilty for the cybercrime issues. Most of the cases are intentional and they doing this cybercrime for the need of getting extra money by cheating. These all are the unauthorized manner from the personal point of view to trespass their personal data by the immoral process of entering. In case of computer program interference subsection 5(2) is being implemented in case of data storage contemplated by the section of 6(2). As the federal manner of constitution, the South African government has imposed the article 239 so that these cases can be mitigated. Some of the cases passwords, access codes are being hacked so that they can access personal data for to acquire and use those documents for the unethical use (Tsikrika et al. 20 17). A restricted computer system must be implemented so that no one can get into the personal data and acquire that. This is a safety policy imposed by the South African government for mitigating the cyber crime-related issues. Any individual who contravene the provisions of section 3(1) or (2), 4(1) or (2), 5(1), 6(1) or 7(1) is predisposed on conviction to a fine or to incarceration for a phase not more than 10 years or to in cooperation a fine and such incarceration. This is being implemented under the section of 275 Criminal Procedure Act. These policies are important to get control over the situation as South Africa has become the third highest cybercrime victimized nation. As the technological variety and innovativeness has imposed in the modern era of presentation thus with that process cybercrime has also created a web for the computer and devices. Cybercrime attack on NHS The cybercrime affect on NHS had devastated the technological barrier of UK cyber crime department. All the patient documents had lost and the doctors and surgeons were not found any evidence from the earlier report (Ganeshkumar, Arivazhagan and Sundaram 2013). They were not derived the more and that technological vulnerability of situation on that point of time had made an imperial attack on the NHS. In December it was reported that virtually all NHS trusts were using an outdated adaptation of Windows for which Microsoft had congested provided that security updates in April 2014. For that reason, an old system has introduced and created problems for the hospitals. All those important and relevant data were not found due to that cybercrime attack. References Fahey, E., 2014. The EU's cybercrime and cyber-security rulemaking: mapping the internal and external dimensions of EU security.European Journal of Risk Regulation,5(1), pp.46-60. Ganeshkumar, K., Arivazhagan, D. and Sundaram, S., 2013. Strategies of cybercrime: Viruses and security sphere.J. Acad. Indus. Res,2(7), pp.397-401. Grabosky, P., 2015. Organized cybercrime and national security. InCybercrime Risks and Responses(pp. 67-80). Palgrave Macmillan UK. Kshetri, N., 2013. Cybercrime and cyber-security issues associated with China: some economic and institutional considerations.Electronic Commerce Research,13(1), pp.41-69. Smith, R.G., Cheung, R.C.C. and Lau, L.Y.C. eds., 2015.Cybercrime Risks and Responses: Eastern and Western Perspectives. Springer. Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017, February. 1st International Workshop on Search and Mining Terrorist Online Content Advances in Data Science for Cyber Security and Risk on the Web. InProceedings of the Tenth ACM International Conference on Web Search and Data Mining(pp. 823-824). ACM.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.