Preview

Combating Cyber Crime: Global Strategies and Cost

Good Essays
Open Document
Open Document
6545 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Combating Cyber Crime: Global Strategies and Cost
Combating Cyber Crime:
Global Strategies and Cost

Guillermo Dumois
Florida International University

Table of Contents Introduction 3 The Increase of Cyber Crime and Attacks 5 Motivations 6 Scale of Attacks 8 Cyber Attacks Impact on Business 9 Estimating Costs of Attacks to Business 10 Direct Costs of Cyber Attacks 12 Indirect Costs of Cyber Attacks to Business 13 Analysis of Financial Costs to Business and Consumers 14 TJX Security Breach - Financial Analysis 15 TJX Stock Comparison 16 TJX Financial Ratios 17 Financial Costs of Attacks 21 Combatting and Preventing Cyber Crime 22 The Role of Government 22 Global Strategies to Prevent and Fight Cyber Crime 23 Conclusion 24 References 25

Introduction
The growth of e-commerce has been astronomical and its relevance to many businesses c=has increased. According to Forrester, e-commerce in the United States is going to reach $279 billion by 2015 (Indvik, 2011). This includes all electronic financial transactions. A 12.6% increase to $176 billion in 2010 has been fueled by an increase in Internet connected devices such as smartphones, tablets, combined with new e-commerce models—such as NetFlix, Groupon, etc. The consumer appears to be the driving force behind the financial boom of e-commerce.
The ease and accessibility of Internet business is clearly of great importance to consumers. We are assaulted on a daily basis by advertisements and other marketing devices on our many electronic devices—all of which have become integral parts of our lives—from young to old. Consumers have also become more comfortable with the purchase of big-ticket items online, items such as airfare, computers, insurance, refinancing of homes, credit card applications, and banking transactions. The ease with which consumers can complete these transactions, paired with consumer perceptions of Internet security, all have greatly contributed to the tremendous growth of electronic commerce.



References: Indvik, L. (2-28-2011). Forrester: E-Commerce To Reach Nearly $300 Billion in U.S. by 2015. Mashable Business. Retrieved from http://mashable.com/2011/02/28/forrester-e-commerce/ Eagers, C Hinchcliffe, D. (6-5-2009). Eight ways that cloud computing will change business. ZDNet. Retrieved from http://www.zdnet.com/blog/hinchcliffe/eight-ways-that-cloud-computing-will-change-business/488 Passeri, P The Economist. (6-30-2012). Business and cyber-security: A spook speaks. Retrieved from: http://www.economist.com/node/21557817  Barrett, D Phneah, E. (9-11-2012). Losses from security breaches becoming significant for firms. ZDNet. Retrieved from http://www.zdnet.com/losses-from-security-breaches-becoming-significant-for-firms-2062305073/ Rashid, F Hachman, M. (Aug. 3, 2011). Massive Five-Year Hack Infiltrates U.S. Govt., UN, IOC. PC Mag.nom Retrieved From http://www.pcmag.com/article2/0,2817,2390344,00.asp Ponemon Institute Symantec (2011). Cybercrime Report 2011. Retrieved from http://www.symantec.com/content/en/us/home_homeoffice/html/cybercrimereport/assets/downloads/en-us/NCR-DataSheet.pdf Chandrasekhar, R. (2008). Security Breach at TJX. Richard Ivey School of Business; The University of Western Ontario. Walsh, L. (6-16-2010). Making Sense of Security Breach Cost Numbers. COmpTIA Blog. Retrieved from http://blog.comptia.org/2010/08/16/making-sense-of-security-breach-cost-numbers/ Montalbano, E. (12-1-2010). Federal Cyber Security Spending To Hit $13.3B By 2015. Information Week. Retrieved from http://www.informationweek.com/government/security/federal-cybersecurity-spending-to-hit-13/228500061 (2007) TJX Annual Report 2007 (2008) TJX Annual Report 2008. Retrieved from http://www.annualreports.com/HostedData/AnnualReports/PDFArchive/tjx2008.pdf Currier, G. (2012). IT Security: Bucking the Trends. CIO Insight.  Retrieved from  http://circ.ziffdavisenterprise.com/pdfs/CIOI_2012_02_Research.pdf Computer Weekly

You May Also Find These Documents Helpful

  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Cybersecurity Case Study

    • 1111 Words
    • 5 Pages

    Getting an adequate cybersecurity budget can be one of the most challenging tasks that many CISOs face. The board wants to keep shareholders happy, which means that they prefer spending on IT to be devoted to business growth and revenue generation. The frequency of breaches makes desensitization more likely, leading to a decreased feeling of urgency to ensure the strength of cybersecurity. Furthermore, many executives have been lulled into a false or misguided sense of security; companies have survived major breaches, and the impact on companies' stock prices has not been as extreme as the declines that followed on the heels of early breaches. It does not help that the return…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Amazon vs. Ebay

    • 584 Words
    • 3 Pages

    According to Heyes (2005), in recent years online shopping is becoming more popular. Two popular online shopping sites are Amazon and eBay. Therefore, in this report, I want to explore which site is more competitive and how each one will do in the future, in relation to the industry in which they compete. The industry of online shopping has a unique service. Online shopping is the process through which consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the internet. Internet business began in1991. It was not until 1994 that online shopping was being utilized, such as online banking. “During the same year, 1994, Netscape introduced SSL (Secure Sockets Layer) encryption of data transferred online, which has become essential for secure online shopping. Also in 1994 the German company Intershop introduced its first online shopping system. In 1995 Amazon launched its online shopping site, and in 1996 eBay appeared” (Wikipedia, 2011, page.1).…

    • 584 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Security Breach

    • 870 Words
    • 4 Pages

    Additionally, the FBI and the Computer Security Institute, in their annual survey on computer crime and information security, gathered the following disturbing facts in 1998: 1) 64 percent of respondents reported a security breach in 1998 — up 16 percent from the previous year; 2) security breaches cost the respondents who could quantify losses a total of $136,822,000 — up 35 percent over the previous year; 3) 18 percent of respondents had no idea whether or not they had been hacked; 4) only 38 percent of respondents had a written intrusion policy, and only 22 percent had an evidence handling policy; 5) 74 percent of respondents reported attacks from inside their networks, and 70 percent reported attacks…

    • 870 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In the past recent years cyber security breaches have cost many businesses in Europe big money as well as damaging competitiveness and reputations. Cyber security incidents have cost more 935 million euros a year. This rises to closet to 4.1 billion when you include data loss, hardware, and software failure. According to the latest research from the European Union Agency for Networks and Information Security here are some of the top five threats European companies must battle to protect from.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Usb Security Threats

    • 651 Words
    • 3 Pages

    Pfleging (2008) also writes how compromising confidential information “can involve privacy laws at the state and federal levels, dictating large fines. An organization 's reputation, and thereby its ability to attract new investors or customers, might be damaged or even destroyed.” Any corporation with an incident such as this could easily suffer great financial losses in today’s technical and struggling economy. Swartz (2006) states, “according to the 2005 “Computer Security Institute (CSI)/Federal Bureau of Investigation (FBI) Computer Crime and Security Survey," average financial losses from unauthorized access…

    • 651 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime . The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes.…

    • 1906 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    irish republican army

    • 1205 Words
    • 5 Pages

    Kelly, B. (2013). INVESTING IN A CENTRALIZED CYBERSECURITY. "HACKTIVISM” AND CYBERSECURITY REFORM , Vol. 92:1663.…

    • 1205 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Literature Review

    • 657 Words
    • 2 Pages

    Data breaches is a term that our society is becoming all too familiar with. They have been occurring more often throughout the past couple of years. An article titled “Data Breaches Keep Privacy & Security Lawyers Increasingly Busy and Looking for Recruits” written by Steven T. Taylor (2012) states “those in the business of cybercrime and protecting against cybercrime may think of 2011 as the year of the breach.”(p. 2) Cyber security has always been a big issue but the more breaches there were the more serious of an issue it became. In 2011 these data breaches affected huge companies and corporations such as Citigroup, Lockheed Martin and many others. The article discusses that it is hard to know whether these data breaches were being done from the inside or not. Not being able to determine the source of these major leaks is a scary thought. These breaches affect more than just the company and the people directly involved. Consumers and investors are going to be turned away from companies that are having security issues and as the article states, lawyers are being kept very busy.…

    • 657 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Human and Computer

    • 9927 Words
    • 40 Pages

    1. INTRODUCTION Business-to-consumer (B2C) e-commerce has been growing steadily in the last decade. Forrester Research (2005) predicted that online retail sales in the United…

    • 9927 Words
    • 40 Pages
    Good Essays
  • Powerful Essays

    Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime” (13). “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”(12)…

    • 5778 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crime and Security

    • 7738 Words
    • 31 Pages

    In less than two decades, the Internet has grown from a curiosity to an essential element of modern life for millions. As with other aspects…

    • 7738 Words
    • 31 Pages
    Powerful Essays