Technical Writing Essay
Zourob
1
Cyber Attacks: A Modern Epidemic of Internet Crimes
According to John McAfee, a cyber security expert, "the modern thief can steal
more with a computer than with a gun. Tomorrow's terrorist may be able to do more
damage with a keyboard than with a bomb" (McAfee, 2012). The quotation illustrates
that the Internet has become the most powerful communication tool, but it has also
become the playground for cyber attacks. Statistics reveal that the exploitation of data
costs the global economy a staggering $80 billion annually (Morgan, 2016). Over the past
decade, computer networks designed a new breed of cyber terrorists who surf the Internet
in search of their next victims. Cyber criminals commit these offences via computer
hacking to perpetuate further illegal acts, such as identity theft, trafficking in child
pornography, cyber harassment, or privacy violations (Techopedia). Virtual hackers
indiscriminately target victims on worldwide networks from businesses, and corporations
to individual citizens, and global influencers. The negative implications of cyber-crime
can lead to tarnished reputations, job loss, or even business failures; however, measures
of prevention can be taken to protect digital assets and private information.
The most common victims of cyber-crimes are global corporations in business
and technology. The biggest security breach of the 21st century impacted one of the
world’s most successful companies. In September 2016, Yahoo’s cyber security breach
affected about 3 billion accounts. The hackers stole a backup of Yahoo’s database to
install “fake cookies” – bits of code stored in the user’s browser cache to avoid the login
process. The web cookies “could allow an intruder to access users’ accounts without a
password” by manipulating the website to accept it as the original cookie (Britton, 2016).
Database of the stolen user accounts contained sensitive information such as email
addresses, passwords, births dates, telephone numbers, and in some cases, credit card
information. This cyber breach cost the company reputational damage, customer loyalty,
and most importantly, more than $1.5 billion in revenue losses between 2015 and 2016 as
illustrated in Figure 1. Yahoo took action by sending out emails to all users urging them
to change their passwords and even added unencrypted security questions for further
protection of private information.
Zourob
2
Figure 1:
Source: Atlas, Data Fact Set
Although cyber criminals target global corporations for valuable digital assets,
cyber attacks on citizens can also be inevitable. Identity theft is one of the fastest growing
crimes globally; costing insurance companies billions of dollars annually. The targets are
bank accounts, credit cards, debit cards, social security numbers, or any other private
information. The most common identity theft hacks that Internet users fall prey for are
“phishing emails”, also known as scam emails. The emails impersonate trusted company
agents or desperate pleas for help to steal personal information and security details. File
hijacking has also become more prevalent in recent years where criminals steal files via
malware software to demand a huge ransom for the return of valuable information. Not
only are adults prone to become victims, but children are also among the newest targets
of cyber-crimes. According to Crimes Against Children Research Centre, 75% of
children are willing to share personal information online about themselves and their
family in exchange for goods and services. Sexual predators lure children into online
chat rooms and social media platforms by pretending to be teenagers looking for
relationships. Solicitations for explicit pictures begin immediately and approximately
39% of online child molesters possess child pornography (Ybarra, 2015). Threats for the
Zourob
3
release of the private pictures lead children to send more explicit photos, and in some
cases, commit suicide.
As cyber-crimes spread across the globe targeting powerful corporations and
innocent citizens, measures of precautions become necessary to protect digital assets. The
need to keep up with technological advancements in security updates become essential,
especially since software flaws can occur. Companies can protect private information by
enhancing security software such as firewalls and antivirus programs. Firewall monitors
data attempting to enter online networks and blocks bad traffic to prevent malicious
software to breach the computer (Schuck, 2005). Investing in employee training and
education on the dangers of “phishing emails” or phone call ticks can help prevent cyber
hacks. Internet users need to regularly review bank accounts statements to immediately
report fraud once it occurs. A hacker’s lottery ticket to a user’s accounts is a weak
password. Cyber security experts recommend using complex and long passwords that
contain a combination of letters, numbers and symbols (Schneier, 2013). In addition,
Internet users need to closely monitor suspicious emails, avoid pop-up ads, and run antivirus software. To protect those who are the most vulnerable to cyber-crimes, parents
need to install control software such as Cyber Fence (Schneier, 2013). Cyber Fence
allows parents to prohibit access to inappropriate websites, and send alerts via text
message when intruders try to lure children to send private information. Lecturing
children about the dangers of cyber criminals promotes a safe online environment to
report any unusual activities to the parents.
Cyber-crimes have destructive effects on businesses, corporations and innocent
citizens causing capital loss, reputational damage and psychological distress. An
individual can do their best to protect themselves by avoiding scam emails, unknown
caller IDs and pop-up ads. The ability to remain anonymous on the Internet imposes new
challenges for law enforcements to persecute online criminals. However, the rise of
cyber awareness through Television shows such as “To Catch a Predator” by Chris
Hanson reveals the dangers of online child predators. In the United States, new
investments in malicious software detection and training are undergoing modifications to
combat cyber-crime. The need for stricter implementations of laws and regulations can
Zourob
4
help create a cyber secure future with guaranteed consequences of online criminal
activities. Most importantly, educating the public about the dangers and methods of
precautions regarding cyber-crimes will build a safe and secure online environment.
Zourob
5
Works Cited
Allison, S. F. H., Schuck, A. M., & Lersch, K. M. Exploring the crime of identity
theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of
Criminal Justice, 2005, 33(1), 19–29.
Britton, Alexander. “Yahoo admits that all 3 billion of its accounts were hacked in
2013 cyber attack.” Mirror, 4 Oct. 2017, www.mirror.co.uk/tech/yahoo-admits-3billion-accounts-.
"Cyber Crime Definition | Techopedia." Techopedia. N.p., 2015. Web. 27 October
2017.
MacAfee, K. The Future of Cyber Criminology: Challenges and
Opportunities. International Journal of Cyber Criminology 2012, 4, 26–31.
Morgan, Steve. “Cyber Crime Costs Projected To Reach $2 Trillion by 2019.” Forbes,
Forbes Magazine, 17 Jan. 2016,www.forbes.com/sites/stevemorgan/2016
/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#658bc7ed3a91.
Schneier, B. The anti-ID-theft bill. Retrieved August 21,
2013, from http://www.wired.com/politics/security/commentary/
securitymatters/2006/04/70690
Ybarra, M. L., & Mitchell, K. J. (2015). Exposure to Internet pornography among
children and adolescents: A national survey. Cyberpsychology & Behavior, 8,
473–486.