Cyber Crime as opposed to Cyber warfare Chapter Introduction 1 - Background The world has become a global village after rapid developments and advancements in information and communication technology, media resources, transportation and networking. The interaction and coordination among people has improved tremendously in last 3 decades after the advent of internet and use of desktop PCs and laptop notebooks. Indeed, businesses have also received innumerable benefits from this free flow of information, opinions, knowledge and ideas across the globe. Nevertheless, new business and investment opportunities are created because of developments in infrastructure and modes of transportation that has enabled businesses to ensure utility of form, place and time.
The use of intranet, extranets, internet and information systems across organisations have contributed significantly in growth and prosperity because it facilitates timely communication with business parties. However, the emergence of hackers and criminals that develop viruses and malwares have jeopardised the security of public and private business information and records in an organisation. The author, therefore, has decided to conduct extensive research over growing menace of cyber crimes and cyber warfare because the present 21st century is known as ‘information era’.
Nonetheless, the organisations now consider greater focus on information and knowledge, which is viewed as most precious asset in today’s business environment. 1.2 – Cyber Crime and Cyber Warfare: Cyber crimes refer to online frauds and internet-based crimes such as hacking email address, user accounts, stealing personal information (credit, visa and debit card pins, bio data, etc) from information systems of firms and from computers of end users, attacking computers through viruses in spam emails etc. Cyber Warfare is different from cyber crimes in a way it refers to online information war between two rival countries.
Indeed, the hackers from Country A may attack government websites, information databases and networks of Country B through use of hacking tools in order to obtain clandestine information regarding foreign policy and agenda, military spending and power, diplomatic relationships and back channel diplomacy etc, economic and trade agreements etc. For instance, the main aim is to access implicit information and to destroy existing data warehouses and governmental networks to bring economic, technical and social losses to rival nation.
Please type your essay title, choose your document type, enter your email and we send you essay samples