Cyberspace Technology

The Cyberspace/Technology revolution has provided a vast improvement on the general welfare. Three areas that have improved within Federal cybersecurity include: Continuous monitoring of Federal information systems, Trusted Internet Connection (TIC) capability and use, and Strong authentication using government issued identity credentials, such as PIV (Personnel Identity Verification) and CAC (Common Access Cards). (“Improving Cyber Security” ). Communities worldwide connect, socialize, and organize themselves around cyberspace.

International businesses for the trade of goods and services in cyberspace, move assets across the globe in a matter of seconds. Cyberspace has advanced the freedom of speech and the social networking that drives our economy. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. Department of Defense, Homeland Security, depends greatly on the cyber information. It enables them to operate smoothly and quickly at a bigger spectrum.

DOD operates over 15,000 networks and seven million computing devices globaly. DOD is made to protect the freedom, privacy, and the free flow of information that we put on the cyberwaves. (“Department Of Defense Strategy For Operating In Cyberspace”, 2010). During the last decade this technology revolution has victimized the U. S. and its citizens by cybercrime. Identity theft is a growing epidemic and has made society undermine the confidence in the information systems that underlie our economic and national security interests.

“Cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation” (2010 National Security Strategy). Cyber attacks are to be the third greatest threat to are nation(“Department Of Defense Strategy For Operating In Cyberspace”, 2010). Cybercrime is one of the greatest threats to our country and nation wide, and has had serious implications for our national security, economic prosperity, and public safety. One case that was nationally known was the Coreflood Botnet Takedown & Civil Action case in Connecticut which was the first of its kind.

Millions of computers were infected by what is called “Corflood Botnets”. Perpetrators used internet providers to issue commands to, and receive stolen data from the infected computers. The stolen data consisted primarily of Internet browsing traffic of unsuspecting users, including online banking credentials. The hackers used the stolen credentials to wire hundreds of thousands of dollars from victims, most of which were small-to medium-sized businesses and similar entities. The policy that was implemented was formed by the FBI that the stealing of additional data and blocking Coreflood from updating itself.

The FBI worked with Internet service providers to identify and notify the owners of the infected software. The FBI also worked with Microsoft and other software vendors, in order to make available updated anti-virus tools for removing Coreflood. (“U. s. Department Of Justice: United States Attorneys On Cybercrime”, ). Stastitics show that by 2017, the Cyber market is expected to skyrocket to $120. 1 billion. The estimated annual cost over global cyber crime is 100 billion. Since Facebook was developed more than 600,000 have been victims of fraud.

One out ten social networkers fall victim to Cyber Crime by spam email and others. (“Cyber Crime Statistics And Trends “, 2013). There are a few common types of Cyber attacks that victims fall pray to. One that is most common is the viruses that Trojans bring into your hardware. Fifty percent fall pray to this crime everyday. Another one is Theft of Data devices. Twenty eight percent of americans fall pray to this crime and there personal information is stolen such as their social security, date of birth, as well as account numbers to their banks.

Statistics Of Bank Fund Fraud Cases Loss And Recovery 22% were able to hold on to funds 10% were able to recover fraudulently transferred funds 68% were declared unrecoverable 37% caused loss to banks due to reimbursements 60% caused loss to businesses (“Cyber Crime Statistics And Trends “, 2013). There are over 556 million people per year that fall victims to cyber crime and eighteen per second. This tells me the cyber world is taken over the future of internet crimes. (“Cyber Crime Statistics And Trends “, 2013). Please click on the video link: http://youtu.

be/dSYLPihGPZE I will be implementing a policy that will combine different agencies across the world to deter the War on Cyber crime. My policy will include law enforcement agencies in the U. S.. The FBI, theUnited Kingdom, New Zealand Police, the Australian Police, and the Royal Canadian Mounted Police. Each of these agencies will share intelligence, tools and practices, and strengths. I will make a proposal for a Information security research and analysis agency for advanced attackers of cybercrime. This proposal will be called “Tyboware”.

This team will create interest in detecting computer viral hackers and trojan breaches. They will gather intelligence, respond to information security alerts, and break the “kill chain” or cyber-attack process. Tyboware can help at every step including the following: Global threat intelligence from our Counter Threat Unit (CTU) about emerging cyber threats against your organization. Threat hunting services to mine deep within the environment for threat indicators . Active incident responders contain the advanced threat and break the kill chain.

Support special initiatives directed at fraud involving large-scale victimization. Each local, state, and federal agencies will be provided with this program to help fight cybercrimes. Also it will form an infrastructure with with the private industry and the public to expand the information flow to better educate, train, and other solutions to respond, prevent, and protect against terrrorist attacks and natural disasters. It will also enhance the risk management capabilities which is a key to national security.

With the help of the FBI, banks will be able to identify fraudulent accounts from other countries. Keeping within the legal boudries, we can have a greater flow of information which willl result in the improved protection of the infrastructure of the U. S.. reinforcing existing structures of the system will help promote domestic laws that could help the government contribute effectively and efficiently to the development and enforcement of global, international rule of law and ensure full compliance. References: Department of Defense Strategy for operating in cyberspace. (2010).

Retrieved from http://www. defense. gov/news/d20110714cyber. pdf? Improving Cyber Security. (). Retrieved from http://technology. performance. gov/initiative/ensure-cybersecurity/home U. S. Department of Justice: United States Attorneys on Cybercrime. (). Retrieved from http://www. justice. gov/usao/briefing_room/cc/ Cyber Crime Statistics and Trends . (2013). Retrieved from http://www. go-gulf. com/blog/cyber-crime/ http://youtu. be/dSYLPihGPZE 6 Great Facts About Cybercrime. (2011). Retrieved from http://www. computerescape. com/blog-0/bid/241590/6-Great-Facts-About-Cybercrime.