Discuss about the Investigation on Cyber Security Threat.
The invention of the computer brought a revolutionary change in the daily life of the human beings. It was thought to be a blessing for the humankind. Years after the discovery of the machine turned out to be blessing in disguise for the humanity. The main reason behind it is a crime committed using this device (McClain et al. 2015). Cyber Security is evaluated on the security, access, storage and integration of data through various electronic modes.
The report deals with the threat characterization of the cyber security threats, the investigation methods acquired in resolving the threats and various types of threats the cyber security threats provides and the measures taken against them.
According to Cavelty, and Mauer, (2016) the national security agencies, as well as the enforcement of the law, are recently facing various types of cyber threats. McMahon, Bressler, and Bressler, (2016) claimed that the result provided by the Federal Bureau of Investigation inferred that around $233 through credit card and $3000 check fraud per complaint is reported by Morning Herald. Bhatti, and Sami, (2015) argued the top cyber crime that happened and the complaint that was lodged against it is in the field of Non-delivery of the merchandise that was ordered online, fraud in the area of auction, credit and debit card, computer fraud and the financial institution fraud. The investigation of the cyber crime faced significant challenges that include the tactics of application, cooperation from the parties on whom the investigation is done and setting up regular operation on the legal frameworks.
Kuhlthau, (2015) cited that the threat modelling involves the identification of the critical system by creating interconnections drawings and data flow of the programs at a high level. It also includes the identification of the threat and the analysis of it.
Traditional process: According to Cavelty, and Mauer, (2016), the inquiry process is setup for the traditional investigation. McClain et al., (2015) showed that the solving of the crime is critical as the decision to be made after a depth investigation. The factors like technical as well as physical evidence help in determining the solution. According to Sharif et al., (2015) the evaluation of the severity of the damages is based on the on the solution. Thakur et al., (2015) claimed that the primary consideration regarding the case of the cyber crime is the elimination of the threats and the prosecution that are possible for eliminating the risk regarding the cybercrime. The trial possibilities are the decision taken by the Assistant of U.S attorney in the concerned district where the crime occurred. Kott, (2014) showed that the prerequisites provided by the legislation shows a significant restriction that investigation process might faces. If the incurred loss is not that much severe, then the conduction of prosecution is impossible at the level of federal. Nobles et al., (2014) illustrated that the loss that is insufficient and if the charge is done against that crime without the permission of U.S. attorneys, it is considered to be the violation of the law. The attorney must agree with the investigators for prosecuting the case. In a case of this small cybercrime, the local police mostly solve the cases. The investigations regarding the cybercrime are dealt based on case-by-case basis.
Hi-tech Cops: The devices like the software and other electronic devices helps to track and gather the evidence against the criminals who performed the crime online. This technique could be used to identify the hackers who use the worm viruses and the malware leading to the damage of billion dollars (Mcmahon, Bressler and Bressler 2016). This method is also known as pen or trap device, which helps in intercepting online based communication in real time. It also helps in decoding the encrypted codes and the password of a suspected device. McMahon, Bressler, and Bressler, (2016) showed that the use of Hitech Cops is done in Florida that saves an amount of around 10 million dollars for the government. Therefore, the trace was easily obtainable by the police squad.
Cyber Squad: Thakur et al., (2015) illustrated that method is primarily used to fight against the computer intrusions, hackers and spreading of software that is malicious. Paek et al., (2014) cited that the investigation reflected that the Federal Bureau incorporates the use of Infragard that helps in sharing and integration of information regarding the cybercrime. The FBI and US Department of Justice have a governmental unit on cyber-crime and the internet criminals.
Online Undercover: According to McClain et al., (2015), the online undercover method applies that the investigator should be under cover that is the person on whom the investigation is carried should not know his identity. Andress, and Winterfeld, (2013) claimed that this helps in identifying the criminals through series of chats that are performed by the investigator keeping is identity secret.
Type of Cyber Attack |
Definition |
Mechanism |
Measures |
Cyber Stalking |
A person internet chat is tracked and followed |
The electronic communications like instant messages, posted message in the website and e-mail. |
Personal information should not be disclosed regarding the internet chat and any interactions regarding electronic media (Nobles et al. 2014). |
Intellectual crime regarding property |
The source code is tampered. |
The source code is accessed and manipulation of the code. |
The authentication should be strong and technical measures should be taken for preventing the leakage of the data (Bhatti and Sami 2015). |
Phishing |
The financial frauds occurring in the electronic banking sector. |
The techniques of social engineering for committing the identity theft are used. |
The turning down of the phishing websites on an immediate basis (Gupta et al. 2016). The awareness of phishing attack should be present among the users. |
Data Theft |
Stealing the data |
The system is been hacked and the malicious methods are used. |
The system should be secured and measures should be introduced to prevent the leakage of data (Sharif et al. 2015). |
Worms like Trojan Horses |
Various types of hacking mechanisms. |
The methods of installing the hacking software and the propagation of the malicious code. |
Installation of the anti malware systems. |
Conclusion
The methods, as well as the findings of the investigation, show that if the investigated methods are applied, then the cyber crime could be minimised. The email, security and the firewalls are affected too much due to the threats of the cyber security. The economy, safety and the public are very much affected due to the security threat. The cyber security threat is one of the most dangerous crimes that is making the entire world affected.
Recommendation for Traditional process: The most significant limitation in the enquiry process of the traditional investigation process is that the risk and threats of prosecution. The traditional enquiry process is applied during the investigation of small and local crimes. It limitation in the investigation can be eliminated by ensuing the official permission from the US attorneys and agreement of the prosecutors.
Recommendation for Hi-tech Cops: Before applying and using the Hi-Tech cops process for the investigation, the police crime department should anticipate the risk involved with the new technologies and financial resource required. The police department should implement a tradeoff between the technological benefits and procurement cost of the process.
Recommendation for Cyber Squad: In the investigation process revolving Cyber Squad, the specialized team must involve themselves completely for the continuous monitoring and controlling of the crime over the internet.
Recommendation for Online Undercover: The process of online undercover investigation process, must be equipped with continuous monitoring of the operation and investigation. In addition to that, the investigation department must have the permission of the government for accessing the information.
Reference List
Andress, J. and Winterfeld, S., 2013. Cyber warfare: techniques, tactics and tools for security practitioners. Elsevier.
Bhatti, B.M. and Sami, N., 2015, November. Building adaptive defense against cybercrimes using real-time data mining. In Anti-Cybercrime (ICACC), 2015 First International Conference on (pp. 1-5). IEEE.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the role of the state in cyberspace. Routledge
Gupta, B.B., Tewari, A., Jain, A.K. and Agrawal, D.P., 2016. Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, pp.1-26.
Kott, A., 2014. Towards fundamental science of cyber security. In Network Science and Cybersecurity (pp. 1-13). Springer New York.
Kuhlthau, C.C., 2015. Model of the information search process (ISP).
McClain, J., Silva, A., Emmanuel, G., Anderson, B., Nauer, K., Abbott, R. and Forsythe, C., 2015. Human performance factors in cyber security forensic analysis. Procedia Manufacturing, 3, pp.5301-5307.
McMahon, R., Bressler, M.S. and Bressler, L., 2016. New Global Cybercrime Calls for High-Tech Cyber-Cops. Journal of Legal, Ethical and Regulatory Issues, 19(1), p.26.
Nobles, M.R., Reyns, B.W., Fox, K.A. and Fisher, B.S., 2014. Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample. Justice Quarterly, 31(6), pp.986-1014.
Paek, S.H., Park, I.S., Lee, E.Y., Yun, J.B., Sohn, K.W. and Choi, S.J., Electronics and Telecommunications Research Institute, 2014. System for an engine for forecasting cyber threats and method for forecasting cyber threats using the system. U.S. Patent 8,800,037.
Sharif, A., Cooney, S., Gong, S. and Vitek, D., 2015, October. Current security threats and prevention measures relating to cloud services, Hadoop concurrent processing, and big data. In Big Data (Big Data), 2015 IEEE International Conference on (pp. 1865-1870). IEEE.
Thakur, K., Qiu, M., Gai, K. and Ali, M.L., 2015, November. An investigation on cyber security threats and security models. In Cyber Security and Cloud Computing (CSCloud), 2015 IEEE 2nd International Conference on (pp. 307-311). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download