Cybercriminals and How Government Addresses Them

Cybercrime activities have been on the rise following emergent technologies. From the analysis of “5 Most Dangerous Hackers of all Time” by Top trending, cybercrime appears to be an organized activity with adequate knowledge on the target (Top Trending, 2015). World governments seem to be the prime targets of cybercrime activities. This has been evidenced by theft perpetrated by myriad hackers, such as the Pentagon hack in 1994 by Mathew Bevan and Richard Price, among others (Top Trending, 2015).

Mathew Bevan and Richard Price contacted the U.S. agents in Korea and the Korean nuclear facility requesting nuclear material. Most cybercriminals use government systems to infiltrate information, as this permits them to enter into restricted areas. The Hacktivist group targeted the FBI, the CIA, and the Chinese government, for internet freedom and social justice. Astra navigated through the U.S. navy system and managed to steal weapon technology and software’s data later sold to Latino nations.

Prior technological advances have led to improvements in society while simultaneously creating an avenue for wrongdoing. The internet has made life quite easy as services such as shopping, news, education, and work can all be accessed at the comfort of one’s living room from any device that accesses the internet (Kader and Minnaar, 2015). Research conducted by Kaspersky Lab indicates that the channels that have been created to ease life can also be used to perpetrate criminal actions, phishing, and malicious activities (Kaspersky Lab, 2015). However, it is important to note that cybercrimes are initiated for different purposes.

For instance, some are done to hurt or disrupt normality, while others are made to gain money (Kaspersky Lab, 2015). Some of the environments that foster this type of criminality include online banking among other areas that are frequently visited. The government has enacted a cybercrime law where one has to present evidence. Other areas include ethical hacking where hackers act to prompt inefficiency of services offered by a provider. It is, therefore, appropriate to say that in one way or the other, everyone is at the risk of being a target of cybercrime since almost everyone uses the internet.

References

Kader, S., & Minnaar, A. (2015). Cybercrime investigations: Cyber-processes for detecting cybercriminal activities, cyber-intelligence, and evidence gathering. Acta Criminological: African Journal of Criminology & Victimology, 5, 67-81.

Kaspersky Lab. 2015. Consumer security risks survey – From Scared to Aware: Digital Lives in 2015.

Top Trending. (2015). 5 most dangerous hackers of all time. YouTube. Web.

Cite this paper

Select style

Reference

StudyCorgi. (2022, May 26). Cybercriminals and How Government Addresses Them. https://studycorgi.com/cybercriminals-and-how-government-addresses-them/

Work Cited

"Cybercriminals and How Government Addresses Them." StudyCorgi, 26 May 2022, studycorgi.com/cybercriminals-and-how-government-addresses-them/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Cybercriminals and How Government Addresses Them'. 26 May.

1. StudyCorgi. "Cybercriminals and How Government Addresses Them." May 26, 2022. https://studycorgi.com/cybercriminals-and-how-government-addresses-them/.


Bibliography


StudyCorgi. "Cybercriminals and How Government Addresses Them." May 26, 2022. https://studycorgi.com/cybercriminals-and-how-government-addresses-them/.

References

StudyCorgi. 2022. "Cybercriminals and How Government Addresses Them." May 26, 2022. https://studycorgi.com/cybercriminals-and-how-government-addresses-them/.

This paper, “Cybercriminals and How Government Addresses Them”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.