Combating Cyber Crime: Global Strategies and Cost

Topics: Security, Computer security, Financial ratio, Information security, National security, Balance sheet / Pages: 27 (6545 words) / Published: Apr 12th, 2013
Combating Cyber Crime:
Global Strategies and Cost

Guillermo Dumois
Florida International University

Table of Contents Introduction 3 The Increase of Cyber Crime and Attacks 5 Motivations 6 Scale of Attacks 8 Cyber Attacks Impact on Business 9 Estimating Costs of Attacks to Business 10 Direct Costs of Cyber Attacks 12 Indirect Costs of Cyber Attacks to Business 13 Analysis of Financial Costs to Business and Consumers 14 TJX Security Breach - Financial Analysis 15 TJX Stock Comparison 16 TJX Financial Ratios 17 Financial Costs of Attacks 21 Combatting and Preventing Cyber Crime 22 The Role of Government 22 Global Strategies to Prevent and Fight Cyber Crime 23 Conclusion 24 References 25

Introduction
The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.
The ease and accessibility of Internet business is clearly of great importance to consumers. We are assaulted on a daily basis by advertisements and other marketing devices on our many electronic devices—all of which have become integral parts of our lives—from young to old. Consumers have also become more comfortable with the purchase of big-ticket items online, items such as airfare, computers, insurance, refinancing of homes, credit card applications, and banking transactions. The ease with which consumers can complete these transactions, paired with consumer perceptions of Internet security, all have greatly contributed to the tremendous growth of electronic commerce.



References: Indvik, L. (2-28-2011). Forrester: E-Commerce To Reach Nearly $300 Billion in U.S. by 2015. Mashable Business. Retrieved from http://mashable.com/2011/02/28/forrester-e-commerce/ Eagers, C Hinchcliffe, D. (6-5-2009). Eight ways that cloud computing will change business. ZDNet. Retrieved from http://www.zdnet.com/blog/hinchcliffe/eight-ways-that-cloud-computing-will-change-business/488 Passeri, P The Economist. (6-30-2012). Business and cyber-security: A spook speaks. Retrieved from: http://www.economist.com/node/21557817  Barrett, D Phneah, E. (9-11-2012). Losses from security breaches becoming significant for firms. ZDNet. Retrieved from http://www.zdnet.com/losses-from-security-breaches-becoming-significant-for-firms-2062305073/ Rashid, F Hachman, M. (Aug. 3, 2011). Massive Five-Year Hack Infiltrates U.S. Govt., UN, IOC. PC Mag.nom Retrieved From http://www.pcmag.com/article2/0,2817,2390344,00.asp Ponemon Institute Symantec (2011). Cybercrime Report 2011. Retrieved from http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/assets/downloads/en-us/NCR-DataSheet.pdf Chandrasekhar, R. (2008). Security Breach at TJX. Richard Ivey School of Business; The University of Western Ontario. Walsh, L. (6-16-2010). Making Sense of Security Breach Cost Numbers. COmpTIA Blog. Retrieved from http://blog.comptia.org/2010/08/16/making-sense-of-security-breach-cost-numbers/ Montalbano, E. (12-1-2010). Federal Cyber Security Spending To Hit $13.3B By 2015. Information Week. Retrieved from http://www.informationweek.com/government/security/federal-cybersecurity-spending-to-hit-13/228500061 (2007) TJX Annual Report 2007 (2008) TJX Annual Report 2008. Retrieved from http://www.annualreports.com/HostedData/AnnualReports/PDFArchive/tjx2008.pdf Currier, G. (2012). IT Security: Bucking the Trends. CIO Insight.  Retrieved from  http://circ.ziffdavisenterprise.com/pdfs/CIOI_2012_02_Research.pdf Computer Weekly

You May Also Find These Documents Helpful

  • cyber crime
  • cyber crime
  • Cyber Crime
  • Cyber crime
  • Cyber Crime
  • Cyber Crime
  • Cyber Crimes
  • cyber crime
  • Cyber Crime
  • Cyber Crime