Cybercrime And The Internet

Brilliant Essays
Register to read the introduction… One of these groups that works within the U.S. is the U.S. Department of Homeland Security (DHS). The DHS works with public and private partners to enhance cyber security and make cyberspace more safe (“Homeland Security: Critical Infrastructure Sector Partnerships” par.2). One way of accomplishing these goals is by promoting cyber security awareness in order to improve internet users’ “digital literacy,” or knowledge of technology. In addition, the DHS issues bulletins and alerts on potential cyber threats. These bulletins allow the sharing of information between private sectors so they can help defend themselves against these threats (“Homeland Security: Secure Cyber Networks” par.3). The organization also oversees the protection of the “.gov” website domain using intrusion detection technology to monitor the domain and identify cyber vulnerabilities (“Homeland Security: Secure Cyber Networks” par.2). The work of the DHS benefits the information technology community and helps protect the U.S. public from threats against cyber …show more content…
One way people can protect themselves is by avoiding simple passwords based on birthdays, surnames, and other personal information to create stronger passwords that make it harder for hackers to crack (“News 24” par.19,20). In addition, individuals must learn to use cyber security to encrypt and protect their files. There are websites where people can go to learn more like the IC3 sponsored website: “lookstogoodtobetrue.com.” This website posts public service announcements and scam alerts online and distribute them not only to the public, but also to law enforcement and media agencies to raise awareness and spread information (“Internet Crime Complaint Center” p.19). When individuals fail to protect themselves, police must be equipped to combat cybercrimes. The first step law enforcement agencies need to take it to encourage people to report crimes so the police have an opportunity to solve the crimes and try to combat the problem. Police stations also must make every effort to adopt the new task force model into their own agencies because “as it is now, local police don’t have the widespread know-how to investigate cybercrimes”(Sullivan, par.2). Once the police educate themselves, they can work to educate local businesses and people to combat cybercrime as well. Individuals and law enforcement agencies must take steps in raising awareness and educating

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    The Department of Homeland Security is an appropriate organizational design for several essential elements which are transferring immigration and naturalization service, border patrol, U.S. customs service, animal and plant health inspection service, U.S. Coastguard, and transportation security administration. The intelligence community mission is to supply the homeland security enterprise with timely intelligence information that is needed to protect, safe, resilient, and secure the United States. Also, national strategy defined homeland security as preventing the United States against terrorist attacks, decrease the America vulnerability to terrorism, reduce damage, and recover from terrorist attacks when it does occur (Burch, 2008). Moreover,…

    • 619 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The terrorist attacks of September 11th reshaped the governments focus on the domestic security of the United States and its citizens. Established after the terror attacks of September 11th the DHS combined multiple agencies into one agency which reports directly to the President of the United States. The Department of Homeland Security (DHS) faces the daunting task of protecting the continental United States from terrorism threats. After the attacks the government set out to ensure the US would never face another situation or attack like the one that had occurred. In order to do so the government had to transform the way it handled one major component, Intelligence.…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This research will focus on the theories of digital crime and how they cause criminals to commit their crimes. Choice theory is the notation that people always have some type of choice about how to behave, It is also based on the presumption that all behavior represents the single persistent strive to satisfy that person 's basic needs. Choice theory teaches that outside events that makes a person not do. It is the central aspect of its beliefs that are internally and not externally motivatives (William Glasser). Learning theory is a conceptual substructure describing how information is absorbed, processed, and retained during learning Even though Some people think theory has nothing to do with criminals who commits there illegal acts, because…

    • 1126 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    The department of Homeland was a department organized after the terrorist attack on September 11, 2001. The homeland defense has many roles, and I know bringing them together will help us further understand about each department. The primary mission, task and responsibility, how resources are used to accomplish these task and the relationship that the homeland security and defense share is how we will come to know and understand the reason for the start and continued function of this department with…

    • 1534 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    This article explores the benefits associated with the use of cybersecurity in day to day living. The authors focus on the reasons why many people are shifting their operations to involve use of cybersecurity. As used by the national presidential administrators, the authors of the article postulate that it is necessary to have national strategies for electronic security as a protection from intrusion. Further, the authors of the article claim that the integration of cybersecurity has…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Forms Of Digital Crime

    • 547 Words
    • 3 Pages

    1. Describe some of the most common forms of digital crime. The four most common forms of digital crime are Tax-refund Fraud, Identity Theft, Theft of Sensitive and Theft of Intellectual Property. I have been the victim of two of these and maybe all four because two of them can happen and connection with the other. For example, back in 2013, around tax time, I received a letter from the IRS office out of Georgia, stating that I owe states for 2012 taxes year.…

    • 547 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The Prosecution of Cyberbullies Twenty percent of children ages 11-18 have been cyberbullied, and 10% of those have also been the offender of cyberbullying. Cyberbullying is a growing problem among the teens of this new, technology-driven generation. Many people have the opinion that cyberbullies should be prosecuted. Offenders of cyberbullying cause harm to the victim and are becoming more common in society.…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Research has shown that criminals usually fall into stage one and two of moral development, where non-criminals usually fall in between stages three and four. In stage 1, children comply with authority out of fear. Leaving the assumption that something is viewed morally correct if punishment is avoided. Therefore, individuals that did not progress through this stage will think that their criminal behavior is acceptable as long as they go unpunished for the criminal act. In stage two children define what is right by having their needs satisfied; defining what is right if they are not punished for it (stage 1) and it satisfies their needs.…

    • 1361 Words
    • 6 Pages
    Great Essays
  • Great Essays

    These are agencies like the Office of Intelligence and Analysis and the Homeland Security Intelligence Council (Randol, 2010). Outside of the National agencies there are also local partners that are relied on like local level law enforcement agencies and intelligence-led policing. All of these agencies help the DHS decrease weaknesses in the…

    • 1699 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays