According
to the study by Hinde (2003) in the
Twenty-first century, various issues were reported related to the internet and
advanced technologies as it is focused that criminal operations and also
traditional crimes increased in the digital world due to digital technologies.
However, in the modern world, there are concerns to facilitate crimes because
everyone has internet. The reported crimes in this era are related to payment
card fraud, intellectual property theft, etc. some victims and criminals are
involved (Hinde, 2003).
Moreover, information security in the modern world also has associated laws and
policies. The criminal activities are concerned in the modern world, there are
issues related to identity fraud, as indicated in the study by Kwan, et al. (2010) that ‘advance fee'
frauds, online auction frauds also the identity and payment card were
identified. It is noticed in Internet Crime Complaint Centre out of 275,284
complaints 26.5% or 72,940 cases in 2008 were reported related to internet
crimes.
Kwan, et al. (2010) 25.5% of the
reported cases were related to the US law enforcement crime, 16.3% were related
to the online auction fraud and 9% were payment card fraud (Kwan, et al., 2010). Phishing and cyberthreats also focused
on the researchers. There were several cases reported related to identity theft
and people also reported about the loss of important data examples, family
photos. There were also reports related to power plants, social functioning,
financial service companies, and Hospitals, etc (Kwan, et al., 2010).
Moreover,
4.7% of the advance fee scam accounted, etc. In 2008, there was a 265 percent
increased in the digital crimes and 60 percent of current malicious code or
issues were detected. Due to the issues that were addressed in the past years;
the government took steps to address the technological issues. However,
Malware5 is software designed by the professionals so that there should be no
issues regarding security infiltrate (McMahon, Bressler, & Bressler, 2016).
In
the study by Whitty & Buchanan (2012), there
is also a focus on the threat for financial markets; financial institutions or
regulators as the Cybercrime related to network securities were addressed.
There were also reports related to the credit card and payment scams. There are
phishing attacks that can theft the sensitive information of a person and then
there could be physical or mental harm, however, mostly, it includes the losses
related to the finance or financial wealth because of people's personal
information. The issues that were reported in the past were related to the
theft of the credit card details, duping victims, social security numbers
usernames, passwords, etc. The cyber-fraud in the retail was also reported
which were taken place by the innovative media platforms, several institutions
were indirectly exposed because of the current cybercrimes related to the
financial sector to cyber-risk (Whitty & Buchanan, 2012).
The
research conducted by the May, Jochim, &
Sapotichne (2011) there were the reports related to the cybercriminals
as the multiple targets; the primary targets were divided into the four main
categories: federal agencies (i.e., the Department of Homeland Security, White
House, Congress, and other government agencies). These agencies faced the
issues related to the targets of cybercrime example the current impending
threats and cybercrimes which included child sexual exploitation, hacking,
online pornography, identity theft, and fraud, cyberstalking and also digital
harassment. There were issues related to cybercrime and fraud as 9,000 reports
of Action Fraud as well as the National Fraud Intelligence Bureau (NFIB).
However, in the years 2015 and 2019, there was an increase in cybercrime issues
from 51 percent to 62 percent (May, Jochim, & Sapotichne, 2011).
References of Cybercrime Threats to Network Security
Christiansen, Bryan, Piekarz, & Agnieszka.
(2018). Global Cyber Security Labor Shortage and International Business
Risk. IGI Global.
Gragido, W., & Pirc, J. (2011). Cybercrime
and Espionage: An Analysis of Subversive Multi-Vector Threats. Newnes.
Hinde, S. (2003). The law, cybercrime, risk
assessment and cyber protection. Computers & Security, 22(2),
90-95.
Kwan, M., Overill, R., Chow, K.-P., Silomon, J.,
Tse, H., Law, F., & Lai, P. (2010). Evaluation of evidence in Internet
auction fraud investigations. In IFIP International Conference on Digital
Forensics, 121-132.
May, P. J., Jochim, A. E., & Sapotichne, J.
(2011). Constructing homeland security: An anemic policy regime. Policy
Studies Journal , 285-307.
McMahon, R., Bressler, M. S., & Bressler, L.
(2016). New global cybercrime calls for high-tech cyber-cops. Journal of
Legal, Ethical and Regulatory Issues, 29(1), 26.
Whitty, M. T., & Buchanan, T. (2012). The online
romance scam: A serious cybercrime. CyberPsychology, Behavior, and Social
Networking, 15(3), 181-183.