Vous êtes sur la page 1sur 6

Grevious 1

/
Brandon Grevious
Connie Douglas ENG 112

/'

10/27/2014

Annotated Bibliography
Cybercrime is a Growing World Wide Epidemic
~

"Cyber-attacks require a Military Response." Hacking and Hackers. Ed. Margaret Haerens and
Lynn M. Zott. Web. 19 Oct. 2014.
To sum it up quick this article discuss how the United States will respond to cyber threats
and attacks against the United States government. This article states that upon receiving a cyberthreat or attack they will respond with military force. The Department of Defense is the US
government responsible for the national security. This article went into detail about how the
United States of America would protect and respond to cyber treats and attacks. I believe that
handling cybercrimes with military force will not get any problem solved, in order to stop
cybercrime the United States of America needs to produce more ethical hackers, which are
"good hacker" these people are the only people who can stop these cyber criminals from creating
cybercrimes. Although I do think that military force would put a little fear into the people that
are doing the hacking.
Cybercriminals Use Personal Information on Social Networking Websites to Commit Crimes."
Web. 19 Oct. 2014.
In this article the author discusses the dangers of Facebook which is a social networking
websites that allows people to connect with friends and other people, but who really are those

Grevious 2

"other people". Facebook is a dangerous website, many people post personal information on
their websites. According to this article people, post their full name, their children's names,
birthday dates and even locations on Facebook. This article suggest that individuals who post all
of their personal information are putting their selves at risk to being a victim of cybercrime. I
agree with this article one hundred percent. I know a lot about computers and hacking, and
Facebook is one of the major websites that hackers tend to troll on. This article was a great read
and it suggested was on how people could protect themselves and how not to be a victim of this

..

growing on going Issue.

-?

Flamini, Roland, Is the United States safe from Internet ~riminalS', February, 13th, 2013
This article discusses the fact that the United States governments are not safe and are at
high risk for cyber-attacks from other countries. Using computers hackers can steal corporate
trade secrets from around the world and even rob banks just by sending one simple malicious
malware code out. Laws to protect the people from cybercrime have not been passed since 2002

..........
when.

Early in 2012 president Obama signed an executive order that was supposed to help

protect the government and businesses from the growing issues of cyber-attacks, but this law
does not help with privately owned companies. This article pretty much showed me how the
government is affected by cyber criminals each and every day, and that the government is at least
trying to improve the threat of cybercrime so that everyone around the world can be safe while
connected to the internet.
Hyman, Paul, Communications ofthe ACM, Cyber Crime it is Serious but Exactly How Serious,
March, 2013

Grevious 3
This article explains how much cybercrime is costing the world every year. According

to the McAfee Inc. cybercrime is costing the world about one trillion dollars each and every year.
McMee came up with this number based on the amount of money businesses lose worldwide
due to both malicious and accidental data loss. The article also explains how difficult it is to
recovery from a cybercrime, tons of information is stolen and or deleted, which can cost a
company millions to replace. I found this article useful and it gave a 11t!!. te~out
money is involved in cybercrimes.

-..

I enjoyed reading this article.

--41 V

tV

how ~
~

z:
.:::
Marshall, Patrick, Are U.S military and Civiliancomputers safe, February 23,2010.
.::

";S'

Apparently China released a serious cyber-attack on google servers which was a huge
threat to the American people and the government, and it was a huge national security threat.
Important information was stolen along with billions of dollars and military secrets.
States was unprepared for such powerful cyber-attacks.

The United

America is way behind when it comes to

technology, other counties like China, Japan, London and other foreign countries are way more
advanced, America need to focus more on protecting their people online, millions of people were
affected by these attacks on the google serves. China began its cyber-attack on google by
sending out spam emails. These spam emails were so powerful that the Chinese cybercriminals
were able to get into the servers and steal information linked to the google servers. About thirtyfour companies were affected by the horrific cyber-attack, some of these companies included in
the, Yahoo, Symantec, Adobe and Dow Chemical.
The internet is so powerful, and allows hackers to cross country borders in a matter of
seconds. I can definitely imagine this happening. This article gave me details about how the
United States was affected by cybercrime and how they had to recover from the attacks from
China.

if ~

Grevious 4

Srivastava, Tushar "Hackers Break into AAI network, steal crucial information"
Hindustan Times, September 23rd, 2014.
On July nineteenth 2014, a group of hackers broke into the servers of the Airport
Authorities (AAI) ofIndia, and stole critical information.

The AAI was shocked, disk volume

had been deleted from the servers which caused a huge problem. The AAI reported their
problem to the Delhi Police Cybercrime cell and ordered an internal probe to investigate to see if
they could find the source behind theses crucial attacks. The information stolen by the hackers
included payroll information for their 19,000 plus employees, human resource information,
finances and project material for all one hundred and twenty five of the airports that are
controlled by the AAI.
I am shocked that this has happened, I know a lot about computers and hacking into
systems. Hackers breaking into the servers of the Airport Authorities is pretty scary because
they have some of the best protection as far as cybersecurity goes. Tracking a hacker is not an
easy task to accomplish, and it will take some time for AAI to recover from this. The hackers
were able to steal very important that quick. The Airport Authorities ofIndia are going through
the process of recovering from this tragic cybercrime. This article discusses the importance of
learning how to protect yourself by taking certain security measures, by changing passwords that
are critical for servers, storages and network devices.
Swecker, Chris. "Identity Theft Is a Serious Problem. " Cyber Crime. Ed. Louise I. Gerdes.
Detroit Greenhaven Press, 2009.

Grevious 5
Chris Swecker author of this article states "Armed with a person's identifying
information, an identity thief can now open new accounts in the name of a victim, borrow funds
in the victim's name, or take over and withdraw funds from existing bank accounts of the
victim" Identity theft is one of the biggest forms of cybercrime in this generation. The article
explains the dangers of identity theft. Hacker's online try to steal personal information such as
social security numbers to open up bank accounts and withdraw money from existing bank
accounts. Identity theft hackers destroy the lives of individuals all over the world every day.
This article explains that victims of identity theft have sometimes been arrested for
crimes that they did not complete, also hackers who commit these cybercrimes are ruining the
credit scores of instant people, which can result in them not being able to cash checks, purchase
homes and even obtain credit cards. In a survey taken by the Federal Trade Commission back in
May, 2003, consumers over the age of eighteen had lost over fifty-six billion dollars do to
identity theft hackers.
The majority of these victims had their information stolen online when they would enter
their credit card information to make online purchases on various websites. I was a victim of
online cybercrime a few years ago so I can relate to this article a lot. When I lived in
Huntersville, North Carolina about five years ago I was doing some online shopping and entered
my debit card information to make my purchases, about a week later I received a call from Wells
Fargo informing me that my bank account had a series of unusual activity. I checked my account
and sure enough there were purchases on my bank statements that had not been made by me, I
called Wells Fargo back immediately and filed a claim. Luckily I was able to obtain the money
that I had lost. What happened was a hacker online had stolen my information and tried to order

-,
Grevious 6
a new debit card and send it to Chicago, most people are not as fortunate as I was in that
situation.

1
Ways Press International, Cybercrime World Wide War 3.0, November, third 2009.
This ~icle

explains that the tools required to stop cybercrime are evolving and updating

each and every day, but the bad thing about that is the criminals are evolving and getting better at
what they do as well. The power of organized cybercrime online grows every day. Military's in
other countries use cybercrime as a way to find out information about their enemy. Cyber
terrorism can be done anonymously and is very aggressive. A cyber-attack can do just as much
damage as a physical attack.

The article further explains how today societies around the world

relies on the internet, and how it would not last without it. Computer viruses can transfer from
computer to computer regardless of location. Cybercrime fmds its victims all around the world,
and is become a huger worldwide epidemic

Vous aimerez peut-être aussi