Cost Of Cyber Crime

Improved Essays
According to former US Secretary of Defense (SECDEF) Leon E. Panetta, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11.” He further elaborated on the danger our cyber based society faces in an October 2012 meeting with business leaders, highlighting high profile cyber attacks that affected Saudi Arabia and Qatar’s energy sector. In this attack conducted by unknown actors “30 thousand computers integral to Saudi Arabia and Qatar’s energy sector were rendered useless”, and he warned that America 's critical infrastructure and corporations are in danger just as much if not more so than any other country in the world. In order to better understand the danger in which …show more content…
based research institution recently released an October 2015 study “Cost of Cyber Crime” sponsored by Hewlett Packard enterprise. This study which was based on data from 52 U.S. based multinational corporation’s and 252 companies in 7 countries found that the mean annualized cost for cyber crime is $15 million per year. This range which varied from company to company was dependent on the size of the company and measures taken to mitigate cyber threats from both external and internal nefarious actors. Additionally, the 2015 mean annualized cost of $15 million per year has increased $2.7 million from $12.7 million in 2014 showing a gradual increase. And of those losses based on cyber crimes conducted year to year the costliest have been those caused by denial of services1 ($255,470 FY15), malicious insiders2 ($179,805 FY15), and malicious code3 ($164,500 …show more content…
According to Ponemon’s study, of the four potential consequences of a successful cyber attack: the loss of information, disruption of business, loss of revenue and damage to equipment. Over the last six years 42 percent of cyber attacks have resulted in information loss compared to the 17 percent which have resulted in the actual loss of revenue. As such taking steps to protect confidential information is more than a sound business decision to protect or support a company’s direct stakeholders. In many ways it is apart of a social contract wherein it is your ethical and legal obligations to exercise the vigilance needed to protect confidential data. There is no better example of how failing to properly secure your systems from cyber attacks can negatively effect the masses than the high profile cyber attack on the Office of Personnel Management (OPM). In June of 2015, OPM announced that the “background investigation records of millions of current, former and prospective federal employees and contractors had been stolen in a cyber intrusion” that had been ongoing since early 2014. OPM who conducts approximately 90 percent of the governments background investigations was warned since at least 2007 of “significant deficiencies in its cyber security protocol and failed to take steps to remedy those

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Homeland Security again stated: “It is imperative that we, as a country, take more action to strengthen our national policy on critical infrastructure security and resilience, and that includes measures to strengthen cybersecurity. Because the majority of our critical infrastructure is owned and operated by private companies, the public and private sectors have a shared responsibility…

    • 1880 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Woodburn Graphics

    • 523 Words
    • 3 Pages

    As a result, the internal technology was secured with antivirus software; however, the MIS and Web server were linked to outside lines without similar software protection. In effect the management team could not justify the cost for greater protection for network security. Within the initial months of the company’s email policy, consequently, three malicious network attacks happened, affecting email, files, servers, and the network itself. These attacks in total cost the company $15,000.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    This article explores the benefits associated with the use of cybersecurity in day to day living. The authors focus on the reasons why many people are shifting their operations to involve use of cybersecurity. As used by the national presidential administrators, the authors of the article postulate that it is necessary to have national strategies for electronic security as a protection from intrusion. Further, the authors of the article claim that the integration of cybersecurity has…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Cyber-attackers invaded the largest defense company in the world and the most important suppliers of the Pentagon to the network - but who they were and what they wanted? Officially there is to much information, but a look at the recent past may shed light on the object and purpose of the action. The affected defense contractor Lockheed Martin and the Pentagon was already target of cyber espionage: In April 2009, a 1.4-terabyte file was stolen, which was the largest at the time, weapons project of the United States to content: Plans of the 300-billion dollar " Joint Strike Fighters "who now call" is produced F-35 Lightning II "-Tarnkappen fighter jet (WSJ report). "It may well be that the attacker wanted to catch a few more information," says the German Cyberwar expert Sandro Gaycken of the Freie Universität Berlin.…

    • 845 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    ¨Usually law enforcement agencies collect data on a suspect after they have been identified. This often resulted in missed opportunities, lost lives, just paving the way for only more destruction. But what if data could be collected in advance, before the suspect was even known? What if just the act of collecting data could result in the identification of completely new suspects? More than a few have pondered this question, just days after the Sept. 11th attacks on New York and the Pentagon, John Yoo, the Justice Department lawyer at the time, wrote an internal memo that argued that the government should use "electronic surveillance techniques and equipment that are more powerful and sophisticated than those available to law enforcement agencies…

    • 806 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This document will examine how and what role the US government surveillance has played in the information security of tomorrow. Additionally, this report will address what individual organizations can do in this ever changing environment. Lastly,…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    While attacks on institutions are ongoing, I believe that attacks on individuals are a greater threat to our nation. Institutions like the Department of Defense (DOD) or even the Federal Bureau of Investigation (FBI), are well protected and have protocols in place to counter cyber-attacks. Individuals, however, are less likely to practice good cyber-awareness therefore making these persons likely and susceptible targets to attacks. In an article published on cnbc.com, writers stated how vulnerable the United States is as a whole. After an in-depth interview with an expert in cyber warfare, cnbc went on to state, "Attacks such as the cybersecurity breach at the Office of Personnel Management in 2015, have reportedly given key information to governments like China that can be used to blackmail American citizens working with sensitive information" (Amaro, Gamble, 2018).…

    • 601 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Breach Essay

    • 444 Words
    • 2 Pages

    Consider these eight common cyber breach costs. 1. Loss of Customers - A 2016 study found that 76 percent of consumers would stop doing business with a company that suffered repeated data breaches. 2. Business Disruption - Business process failure and lost employee productivity…

    • 444 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Next the paper will examine whether the national organizational structure tasked with cyber operations needs to be reorganized and subsequently require a change to the United States Code (USC). Finally, the paper will discuss that if a reorganization is required, which agency should be in charge of cyber security for the United States. Cyber Geography The emergence of the cyber domain has been uniquely different than the traditional domains of air, land, and maritime. Theories about both the cyber and space domains have at times been very similar, treating the domains and purely functional rather than having a physical geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays