Entry #11

What is the overlap between criminal justice and cybercrime? How does this overlap relate to the other disciplines discussed in this class?

Over the past decade, reports of cybercrime have soared across the globe. Cybercrime is perhaps the most recent evolution in the world of crime. However, depending on how it is defined, it can mean different things. Here are some examples. Cybercrime as a harmful behavior would focus on the specific and general harms that arise from cyber offending. It is widely accepted that cybercrime costs far more than other crimes. Traditional definitions of cybercrime might also focus on the behavior as a deviant construct. It is not illegal to make mean comments in a web forum. Some types of cybercrime might also be defined as immoral. Internet child pornography is the clearest example. Criminal justice and cybercrime overlap by harming victims, breaking societal norms, and behaving immorally. The very nature of cyber technology is that cybercrimes are not tied to any country’s borders. The way that the crimes travel across international borders can result in jurisdictional issues. The international nature of cybercrime makes it harder to respond to the behaviors. The fact that domestic cases will involve multiple criminal justice agencies, it is imperative that law enforcement and prosecution officials be prepared to collaborate across jurisdictions. Collaboration, particularly across national borders, can be challenging. These challenges, however, must be addressed and overcome to effectively deal with cybercrime cases. This overlap relates to other disciplines discussed in class in a variety of ways, but I will touch on the CIA triad for my case. Confidentiality protects information from unauthorized access and misuse. Misuse can align with hacking and acquiring information that does not belong to them, or ransoming money from an employee with stolen pictures. Integrity measures protect information from unauthorized alteration. An example of alteration would be to hack into a college grading system and change a student’s GPA. Availability measures protect timely and uninterrupted access to the system. The Denial of Service (DoS) attack is a method frequently used by hackers to disrupt web service. In a DoS attack, hackers flood a server with superfluous requests, overwhelming the server and degrading service for legitimate users. Understanding the CIA Triad is an important component, in my opinion, before moving to cybercrime and criminal justice. The foundation and stepping stones to understanding cyber law.

Link: https://drive.google.com/file/d/1HO4NqLoZzpf9pzIvBAYXfT2rCeuhEttI/view

Link 2: https://www.certmike.com/confidentiality-integrity-and-availability-the-cia-triad/

Leave a Reply

Your email address will not be published. Required fields are marked *