Criminals and Internet Crimes Challenges Identifying and Evaluating Electronic CrimesBroad Subject Area: Internet Crimes and the Criminals Who Exploit Them
Subtopic: Challenges commonly faced by IT Security Analysts when investigating and mitigating crimes via electronic means
What are internet crimes and types associated? Also how are the crimes identified within organizations? Hence what are the steps in evaluating these crimes? Also Explain challenges faced by IT Departments and security professionals in this field.
Cybercrime has outgrown its original projection and left law enforcement agencies and information technology professionals scrambling to keep up. This unprecedented explosion within the World Wide Web demands undivided attention and a new path to correction. These crimes are unlike any other and present challenges that require attention to detail and policies that intertwine many agencies. Knowing how to identify is just the first step to a multi-faceted approach in mitigating and bringing cyber criminals to justice.
For this term paper, I would like to be focusing on specific internet crimes. These crimes will be relating to phishing, identity theft and credit card fraud. There is not a single person in the world that has not been subjected to one, if not all, of these cybercrimes.
As a civilian or non-technical person, it can seem like there is nothing these criminals cannot do. But as a security professional, it is your responsibility to focus on identifying these crimes and investigate the source and impact. The crimes are not as cut and dry as a “normal” crime such as robbery or assault. The evidence left behind is often hard to follow or the criminal takes extravagant steps to hide their trail.