Tony Tyboroski
10/18/2013
CJA/464
Professor Kim Chapman
The Cyberspace/Technology revolution has provided a vast improvement on the general welfare. Three areas that have improved within Federal cybersecurity include: Continuous monitoring of Federal information systems, Trusted Internet Connection (TIC) capability and use, and Strong authentication using government issued identity credentials, such as PIV (Personnel Identity Verification) and CAC (Common Access Cards). ("Improving Cyber Security” ). Communities worldwide connect, socialize, and organize themselves around cyberspace. International businesses for the trade of goods and services in cyberspace, move assets across the globe in a matter of seconds. Cyberspace has advanced the freedom of speech and the social networking that drives our economy. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. Department of Defense, Homeland Security, depends greatly on the cyber information. It enables them to operate smoothly and quickly at a bigger spectrum. DOD operates over 15,000 networks and seven million computing devices globaly. DOD is made to protect the freedom, privacy, and the free flow of information that we put on the cyberwaves. ("Department Of Defense Strategy For Operating In Cyberspace", 2010). During the last decade this technology revolution has victimized the U.S. and its citizens by cybercrime. Identity theft is a growing epidemic and has made society undermine the confidence in the information systems that underlie our economic and national security interests. “Cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation” (2010 National Security Strategy). Cyber attacks are to be the third greatest threat to are nation("Department Of Defense Strategy For Operating In Cyberspace", 2010). Cybercrime is one of the greatest threats to our country and nation wide, and has had serious implications for our national security, economic prosperity, and public safety. One case that was nationally known was the Coreflood Botnet Takedown & Civil Action case in Connecticut which was the first of its kind. Millions of computers were infected by what is called “Corflood Botnets”. Perpetrators used internet providers to issue commands to, and receive stolen data from the infected computers. The stolen data consisted primarily of Internet browsing traffic of unsuspecting users, including online banking credentials. The hackers used the stolen credentials to wire hundreds of thousands of dollars from victims, most of which were small-to medium-sized businesses and similar entities. The policy that was implemented was formed by the FBI that the stealing of additional data and blocking Coreflood from updating itself. The FBI worked with Internet service providers to identify and notify the owners of the infected software. The FBI also worked with Microsoft and other software vendors, in order to make available updated anti-virus tools for removing Coreflood. ("U.s. Department Of Justice: United States Attorneys On Cybercrime", ). Stastitics show that by 2017, the Cyber market is expected to skyrocket to $120.1 billion. The estimated annual cost over global cyber crime is 100 billion. Since Facebook was developed more than 600,000 have been victims of fraud. One out ten social networkers fall victim to Cyber Crime by spam email and others. ("Cyber Crime Statistics And Trends ", 2013). There are a few common types of Cyber attacks that victims fall pray to. One that is most common is the viruses that Trojans bring into your hardware. Fifty percent fall pray to this crime everyday. Another one is Theft of Data devices. Twenty eight percent of americans fall pray to this crime and there personal information is stolen such as their social security, date of birth, as well as account numbers to their banks.
Statistics Of Bank Fund Fraud Cases Loss And Recovery
22% were able to hold on to funds
10% were able to recover fraudulently transferred funds
68% were declared unrecoverable
37% caused loss to banks due to reimbursements
60% caused loss to businesses
("Cyber Crime Statistics And Trends ", 2013). There are over 556 million people per year that fall victims to cyber crime and eighteen per second. This tells me the cyber world is taken over the future of internet crimes. ("Cyber Crime Statistics And Trends ", 2013).
Please click on the video link: http://youtu.be/dSYLPihGPZE
I will be implementing a policy that will combine different agencies across the world to deter the War on Cyber crime. My policy will include law enforcement agencies in the U.S.. The FBI, theUnited Kingdom, New Zealand Police, the Australian Police, and the Royal Canadian Mounted Police. Each of these agencies will share intelligence, tools and practices, and strengths. I will make a proposal for a Information security research and analysis agency for advanced attackers of cybercrime. This proposal will be called "Tyboware". This team will create interest in detecting computer viral hackers and trojan breaches. They will gather intelligence, respond to information security alerts, and break the "kill chain" or cyber-attack process. Tyboware can help at every step including the following:
Global threat intelligence from our Counter Threat Unit (CTU) about emerging cyber threats against your organization.
Threat hunting services to mine deep within the environment for threat indicators .
Active incident responders contain the advanced threat and break the kill chain.
Support special initiatives directed at fraud involving large-scale victimization. Each local, state, and federal agencies will be provided with this program to help fight cybercrimes. Also it will form an infrastructure with with the private industry and the public to expand the information flow to better educate, train, and other solutions to respond, prevent, and protect against terrrorist attacks and natural disasters. It will also enhance the risk management capabilities which is a key to national security. With the help of the FBI, banks will be able to identify fraudulent accounts from other countries. Keeping within the legal boudries, we can have a greater flow of information which willl result in the improved protection of the infrastructure of the U.S.. reinforcing existing structures of the system will help promote domestic laws that could help the government contribute effectively and efficiently to the development and enforcement of global, international rule of law and ensure full compliance.
References:
Department of Defense Strategy for operating in cyberspace. (2010). Retrieved from http://www.defense.gov/news/d20110714cyber.pdf
Improving Cyber Security. (). Retrieved from http://technology.performance.gov/initiative/ensure-cybersecurity/home
U.S. Department of Justice: United States Attorneys on Cybercrime. (). Retrieved from http://www.justice.gov/usao/briefing_room/cc/
Cyber Crime Statistics and Trends . (2013). Retrieved from http://www.go-gulf.com/blog/cyber-crime/ http://youtu.be/dSYLPihGPZE 6 Great Facts About Cybercrime. (2011). Retrieved from http://www.computerescape.com/blog-0/bid/241590/6-Great-Facts-About-Cybercrime
References: Department of Defense Strategy for operating in cyberspace. (2010). Retrieved from http://www.defense.gov/news/d20110714cyber.pdf Improving Cyber Security. (). Retrieved from http://technology.performance.gov/initiative/ensure-cybersecurity/home U.S. Department of Justice: United States Attorneys on Cybercrime. (). Retrieved from http://www.justice.gov/usao/briefing_room/cc/ Cyber Crime Statistics and Trends . (2013). Retrieved from http://www.go-gulf.com/blog/cyber-crime/ http://youtu.be/dSYLPihGPZE 6 Great Facts About Cybercrime. (2011). Retrieved from http://www.computerescape.com/blog-0/bid/241590/6-Great-Facts-About-Cybercrime
You May Also Find These Documents Helpful
-
There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…
- 780 Words
- 3 Pages
Better Essays -
Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…
- 1586 Words
- 7 Pages
Powerful Essays -
Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett…
- 299 Words
- 2 Pages
Good Essays -
In today’s age with more and more computers being connected to the internet every day the presence of these new users on the global network creates an issue of security. Common questions might be as follows, how do I keep my network secure from the outside world? What can I do as an individual to keep us safe? Can we implement any new policy’s to counter this threat? These are all great questions and it is my task to answer these question first I must begin by explaining what threats we face and how to deal with those threats accordingly.…
- 667 Words
- 3 Pages
Good Essays -
Cyber security must be an aggressive and evolving practice. Not only is it important to put security in place for current technology that can access electronic information, but also to look forward to future trends and strategies. Methods must also be developed that will continuously protect information regardless of growth and technological advances. As trends change and new technology develops it is the responsibility of businesses to balance cost saving measures with adequate security measures.…
- 1208 Words
- 5 Pages
Better Essays -
But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…
- 1857 Words
- 5 Pages
Better Essays -
Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…
- 3699 Words
- 15 Pages
Best Essays -
Report to the President. February 2005. Cyber Security. Retrieved on May 28, 2011 from <http://www.cyber.st.dhs.gov/docs/PITAC%20Report%202005.pdf>…
- 5724 Words
- 23 Pages
Better Essays -
A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…
- 1317 Words
- 6 Pages
Better Essays -
In the fight against terrorism, the Department of Homeland Security is constantly looking for new technology. Many of these technological advancements in homeland security are based around cyber security technologies. With an increase in cyber warfare and hacking, technological advancements are a necessity if the government plans on combating crime.…
- 515 Words
- 3 Pages
Good Essays -
My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…
- 380 Words
- 2 Pages
Good Essays -
In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…
- 930 Words
- 4 Pages
Better Essays -
Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…
- 1278 Words
- 5 Pages
Better Essays -
Not only am I pursuing a Cybersecurity degree from the University of Maryland University College, but I am planning on making a lifetime career in this particular field, which means I am taking every opportunity possible to learn as much as I can about this career field, and frankly do so with serious passion and dedication. Cybersecurity is one of the few blossoming fields within the U.S. and abroad now in days with all of the new technological advances being made every single day as well as the newly constructed, successful Cybersecurity companies. Every company that wants to protect their classified information hires a Cybersecurity team to keep that information safe and out of the hands of people that could do wrong with that information; even the U.S. government has a massive Cybersecurity program as part of our National Defense to…
- 824 Words
- 4 Pages
Good Essays -
This annex is planned to give significant policies, activities and obligations that are required to react to cyber-related occasions that have national ramifications. The annex puts forward the organized responses from government, state, local, tribal and private-division accomplices. This annex examines policies, association, activities, and obligations regarding a planned, multidisciplinary, expansive supported method to get ready for, react to, and recuperate from cyber-related Incidents of National Significance affecting basic national procedures and the national financial system.…
- 1327 Words
- 6 Pages
Good Essays