Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Cybercrime Categories and the Importance of Addressing Financial Cybercrime in an

Organization's Incident Response Plan

Anil Bhuvan Akula

Belhaven University

2023SU Cyber Law, Regulations, & Comp (ITM-632-1YVF1)

Dr Joe Snider

05/13/2023
Introduction

Cybercrime has become a significant concern for individuals and organizations globally, given

the increasing reliance on technology and the internet. Cybercriminals use various techniques to

target their victims, such as malware attacks, phishing, and social engineering. Cybercrime can

be classified into several categories, including cyber-espionage, cyberterrorism, cyber warfare,

and financial cybercrime. This essay aims to describe the categories of cybercrime and discuss

which ones I have observed, experienced, and/or should be addressed by an organization's

incident response plan.

Categories of Cybercrime

Cyber-Espionage

Cyber-espionage involves the use of technology to gather sensitive information from individuals,

organizations, or governments without authorization. This type of cybercrime is often conducted

by foreign governments or competing organizations seeking to gain an advantage. Cyber-

espionage can be used to steal trade secrets, intellectual property, or personal information.

Cyberterrorism

Cyberterrorism involves the use of technology to cause harm or fear in society. Cyber-terrorists

can target critical infrastructure systems such as power grids, water supplies, or transportation

systems. The impact of cyber-terrorism can be severe, resulting in economic losses and even loss

of life.

Cyber Warfare
Cyber warfare involves the use of technology to disrupt or destroy the computer networks and

systems of a country's military or government. The goal of cyber warfare is to gain a strategic

advantage in a conflict by disrupting communications, intelligence gathering, and decision-

making processes.

Financial Cybercrime

Financial cybercrime involves the use of technology to steal financial information, such as credit

card details or bank account information. Cybercriminals can use this information to commit

fraud, such as making unauthorized purchases or accessing bank accounts.

My Experience
In my personal experience, I have witnessed and experienced financial cybercrime. I have

received suspicious emails from cybercriminals pretending to be a financial institution, asking

me to provide my banking information. Fortunately, I was aware of the risk and did not provide

any information.

Addressing Cybercrime
An organization's incident response plan should address all categories of cybercrime. However,

financial cybercrime is particularly relevant to organizations that handle sensitive financial

information, such as banks or credit card companies. These organizations should have robust

security measures in place to protect against cyber-attacks and should also have an incident

response plan in place to quickly and effectively respond to any security breaches.
Conclusion
Cybercrime is a significant threat to individuals and organizations globally. It can be classified

into several categories, including cyber-espionage, cyberterrorism, cyber warfare, and financial

cybercrime. An organization's incident response plan should address all categories of

cybercrime, but financial cybercrime is particularly relevant to organizations that handle

sensitive financial information. As technology continues to evolve, it is essential for individuals

and organizations to remain vigilant and take proactive steps to protect themselves against cyber

threats.
References
Lemieux, V. L. (2018). Cybercrime. Salem Press Encyclopedia.

Mancini, L. (2017). Cybercrime: categories, actors, and remedies. European Journal of Criminology,

14(5), 606-618.

Rouse, M. (2022). Cybercrime. Retrieved from

https://searchsecurity.techtarget.com/definition/cybercrime.

Albrechtsen, E., Hovden, J., & Strand, J. (2021). Cybercrime victimization and self-protection: A social

cognitive theory approach. Journal of Criminal Justice, 74, 101821. doi: 10.1016/j.jcrimjus.2021.101821

Anderson, K. (2018). The five biggest cyber crimes and how to protect yourself from them. Forbes.

Retrieved from https://www.forbes.com/sites/kevinanderson/2018/04/30/the-five-biggest-cyber-

crimes-and-how-to-protect-yourself-from-them/?sh=3b6ee5d330ce

Kshetri, N. (2018). Blockchain's roles in meeting key supply chain management objectives. International

Journal of Information Management, 39, 80-89. doi: 10.1016/j.ijinfomgt.2017.12.001

Prado-Prado, J. C., & Garcia-Sanchez, F. (2020). The role of blockchain technology in fighting cybercrime:

A review. Computers & Security, 91, 101708. doi: 10.1016/j.cose.2019.101708

You might also like