Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please re write and re-organize the essay. Feel free to change the words. I just

ID: 3450399 • Letter: P

Question

Please re write and re-organize the essay. Feel free to change the words. I just need 500 words. Please keep the references.

In this age of globalization, computer and internet use have become part and parcel of human life (McQuade, 2006). The world is increasingly growing technologically savvy and the internet has revolutionized information and communication technology reducing the world into a global village. Despite the advantages in these technological advances, new malicious innovations through the use of internet spaces and channels have resulted into insecurities for individuals as well as states (Broadhurst, 2006). Cybercrimes directed against individuals and terrorist cyber-attacks on national institutions are examples of such insecurities. This retrospect paper discusses these two cyber crimes and combating efforts in the US. Cyber crime directed against individuals happens in various forms. One of the most common forms is the hacking of individual internet website accounts and gaining access into individuals’ private and personal information (Herr & Romanosky, 2015). In such cases, for instance, cyber criminals may embarrass individuals by publicly displaying their private information, blackmail them into doing what they want for fear of unwanted exposure or even robbing them money in their financial accounts. In other instances, cyber criminals lure vulnerable individuals such as young children into traps such as sexual relationships, pornography and kidnapping. This form of cyber crime may psychologically, emotionally or physically torture the victims (Herr & Romanosky, 2015). On the other hand, terrorist cyber attacks on national institutions are increasingly getting popularized. The US Department of State defines terrorist cyber attacks as premeditated criminal acts perpetrated through information and technology channels with the malicious intentions of accessing institution’s private information, cause confusion and disrupt services (McQuade, 2006). In September 2014, for example, it was reported that Islamic State (ISIS) leaders, Middle East Jihadists and Al Qaeda were organizing cyber-terror attacks against Western nations, where they particularly targeted government servers (Kaur, Sharma & Singh, 2015). Furthermore, ISIS intended to create a ‘cyber caliphate’ that would launch virus attacks and catastrophic hacking. The United States has enforced various measures to combat these cyber crimes. However, the main challenge has been the increasing levels of cyber crime sophistication that has made it virtually impossible to identify the criminals (Herr & Romanosky, 2015). Despite making efforts to fight cyber crime targeted at individuals, most of the focus has been on terror cyber attacks on national institutions that are considered more harmful and capable of causing great tragedy to large masses of United States citizens. The US FBI Director, Robert Mueller, in 2012 pointed out that cyber threats would soon be the number one security threat in the country (Kaur, Sharma & Singh, 2015). The former NSA director, Keith Alexander and former Secretary of Defense, Leon Panetta continuously cautioned against “cyber Pearl Harbour” in the future (Herr & Romanosky, 2015). Through these concerns, the United States has invested heavily on cyberwarfare capabilities and a well trained network of cyberguards to protect national institutions against such terror cyber attacks (Kaur, Sharma & Singh, 2015). In dealing with cyber attacks on individuals, tough laws have been set to counter such crime and regulations on internet usage for under age children. However, with constant innovation and creativity, there is still room for more improvement in the US government’s efforts to combat cyber crime and protect its citizens.

Reference List Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408-433. Herr, T., & Romanosky, S. (2015). Cyber Crime: Security Under Scarce Resources. American Foreign Policy Council Defense Technology Program Brief, (11). Kaur, S., Sharma, S., & Singh, A. (2015). Cyber Security: Attacks, Implications and Legitimations across the Globe. International Journal of Computer Applications, 114(6). McQuade, S. C. (2006). Understanding and managing cybercrime. Boston: Pearson/Allyn and Bacon.

Explanation / Answer

With the age of globalization, computer and internet use have become part and parcel of human life (McQuade, 2006). The world is increasingly growing technologically savvy. The internet has revolutionized information and communication technology condensing the world into a global village. Despite the advantages in these technological advances, new malicious innovations through the use of internet spaces and channels have resulted in insecurities for individuals as well as states (Broadhurst, 2006). The recent episodes of Cybercrimes directed against individuals and cyber-attacks on national institutions are examples of such insecurities. This retrospect paper discusses these two types of cyber crimes and the combating efforts to tackle this in the United States of America.

The Cybercrimes that are directed against individuals happens in various forms. One of the most common forms is the hacking of individual internet website accounts and gaining access to individuals’ private and personal information (Herr & Romanosky, 2015). In such cases, for instance, cybercriminals may embarrass individuals by publicly displaying their private information, blackmail them into doing what they want for fear of unwanted exposure or even robbing them money in their financial accounts. In other instances, cybercriminals lure vulnerable individuals such as young children into traps such as sexual relationships, pornography, and kidnapping. This form of cybercrime may psychologically, emotionally or physically torture the victims (Herr & Romanosky, 2015). On the other hand, terrorist cyber attacks on national institutions are increasingly getting popularized. The United State Department of State defines terrorist cyber attacks as premeditated criminal acts perpetrated through information and technology channels with the malicious intentions of accessing institution’s private information, cause confusion and disrupt services (McQuade, 2006). In September 2014, for example, it was reported that Islamic State (ISIS) leaders, Middle East Jihadists, and Al Qaeda were organizing cyber-terror attacks against Western nations, where they particularly targeted government servers (Kaur, Sharma & Singh, 2015). Furthermore, ISIS intended to create a ‘cyber caliphate’ that would launch virus attacks and catastrophic hacking.

In order to combat these cyber crimes, the United States has enforced various measures. However, the main challenge has been the increasing levels of cybercrime sophistication that have made it virtually impossible to identify the criminals (Herr & Romanosky, 2015). Despite making efforts to fight cybercrime targeted at individuals, most of the focus has been on terror cyber attacks on national institutions that are considered more harmful and capable of causing great tragedy to large masses of United States citizens. The US FBI Director, Robert Mueller, in 2012 pointed out that cyber threats would soon be the number one security threat in the country (Kaur, Sharma & Singh, 2015). The former NSA director, Keith Alexander and former Secretary of Defense, Leon Panetta continuously cautioned against “cyber Pearl Harbour” in the future (Herr & Romanosky, 2015). Through these concerns, the United States has invested heavily in cyberwarfare capabilities and a well-trained network of cyber guards to protect national institutions against such terror cyber attacks (Kaur, Sharma & Singh, 2015). In dealing with cyber attacks on individuals, tough laws have been set to counter such crime and regulations on internet usage for underage children. However, with constant innovation and creativity exhibited by the perpetrators, there is still room for more improvement in the US government’s efforts to combat cybercrime and protect its citizens.

Reference List Broadhurst, R. (2006). Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408-433. Herr, T., & Romanosky, S. (2015). Cyber Crime: Security Under Scarce Resources. American Foreign Policy Council Defense Technology Program Brief, (11). Kaur, S., Sharma, S., & Singh, A. (2015). Cyber Security: Attacks, Implications, and Legitimations across the Globe. International Journal of Computer Applications, 114(6). McQuade, S. C. (2006). Understanding and managing cybercrime. Boston: Pearson/Allyn and Bacon.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote