write 10 page paper on any topic.

timer Asked: Oct 21st, 2018
account_balance_wallet $50

Question Description

It has to be 10 pages with double spaced. its better to write about issues and controversies, its opposing view points and more.

Tutor Answer

School: UC Berkeley

Hey again! Plese see attached. Let me know if you need edits.šŸ˜Š

Running head: CYBER CRIME


The Upsurge in Cyber Crime in Various Organizations in the U.S; what are the Causes
and Solutions



The Upsurge in Cyber Crime in Various Organizations in the U.S; what are the Causes
and Solutions
Executive Summary
The number of cases of cybercrimes has gone up tremendously in recent years, both
individuals and entities have been targeted, different organizations in both private and public
sectors have been victims of such crime which has resulted to massive losses worth billions of
dollars. During such attacks the information that is targeted ranges from proprietary belonging to
the businesses, or personal information of individuals and clients of the said entities which
ranges from personal identification numbers, emails, passwords, their social security
information, passwords and much more. Such crimes lead to massive losses for the affected
parties and the costs are felt either directly or indirectly as losses that are as a result of the
expenses linked to support services, litigations and judicial procedures, settlements, public
relation campaigns and much more. Attacks with such impacts can also have far-reaching
consequences resulting in loss of businesses for the affected party as a result of the customers
losing trust in the company which could even lead to closures.
The main causes of such attacks have been attributed to malicious attacks, human factors,
or system glitches. In this report, I will attempt to look at some of those causes and recommend
some solutions borrowing from some industry experts. It will begin by providing an overview of
cybercrime highlighting some of the cases, providing statistics of the crimes, assess some of the
claims, causes, and then give recommendations on best practices that organizations can use as
solutions that would bring down the levels of such attacks. The final part will also focus on what
the government is doing the legislative and regulatory frameworks that are in place for
combating such attacks before concluding the report.



By 2011 there were more than 2 billion people which are more than a third population of
the world, had access to the internet. More than 60 percent of internet users globally are said to
be found in the developing economies. Estimates had indicated that by last year there would be
70 percent of the world's population would have some form of mobile broadband connection and
come the year 2020 the number of devices within the network up to six times the world's
population. The world is increasingly becoming interconnected. With such interconnectivity
comes a myriad of problems; however, the silver lining is that any crime will involve the use of
an electronic device which has an IP connection allowing for traceability.

Fig. 1 Chart illustrating the global crime figures with the U.S being the most affected country

Each year we get to hear about numerous cases of data breaches across different sectors
mainly in finance, banking, insurance, social services, and the health sectors, in both private and
public organization. Such breaches always lead to massive losses; IBM Securities report gives a
rough idea of the impact, the report indicated that as of 2014 there were over a billion leaked
emails, credit card numbers, exposed passwords, and addresses, sensitive company information



and much more (Kravitz, 2016). More estimates demonstrated that in 2016 there was
approximately $375 to $575 billion lost from the data breaches and were projected to go up to $2
trillion by the year 2019 (McAfee, 2016). Apart from the financial losses, the impact can be farreaching and capable of affecting the organization leading in lost business which could even to
complete shutdown of the said entities (IBM Security Services, 2014).
There are different type of cybercrimes which vary in size, mode of perpetration, and
complexity and they include security incidences, skimming, phishing, privacy violations, and
data breaches (Romanosky, 2016). Cybercrimes that target individuals focus on the mobile
devices which take the form of a wide array of attacks or cybersecurity threats which can be
through system glitches, or through attacks accomplished through hackings, cybercriminal, and
espionage among others. The primary entry points are through spyware, phishing, unsecured WiFi among others (Kaspersky, n.d). Among the various types of cyber crimes, data breaches cause

flag Report DMCA

Excellent job

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors