Predicting the future is full of risk. Cyber crime will continue to rise in the future. Therefore, it will become more imperative for businesses to protect their assets as well as business data on clients. As technology improves, businesses will need to enhance their security options. Any security systems cannot eliminate security breaches completely; however, a plan can be in place to secure the systems and to monitor breaches in hopes of minimizing the risk of attacks. In addition, companies can adopt a comprehensive information security program in minimizing security breaches.
Security is an ongoing process and such comprehensive program could be accomplished through the “defense in depth” model (Livadas, 2007). Security devices will be implemented on all domains: at the physical layer, on the network layer, on the application and on the protocol layer. In addition, businesses can implement new blade server security solutions, which allow redundancy and transparent failover. Moreover, security can include video surveillance at the physical layer or other protections that focuses on......
Although the term cyber crime is usually restricted to describing criminal activity in which the computer or network is an essential part of the crime, this term is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. Thus, cyber crime is often an extension of existing criminal activities through the involvement of computers. Some novel types of crime also exist, however, that feature the computer as an essential aspect of the crime. In all cases, a significant characteristic is its non-local character—just as the internet is not confined to any geographical location; cyber crime transcends jurisdictions, consequently creating difficulties for law enforcement.
Cyber crimes in which the computer or network is a tool of the criminal activity...