Based on the topic: "Emerging computer-related crime", create an outline Term Paper. Your paper must be 12 pages in length. In addition to the 12 pages of the paper itself, you must include a title

Outline

Topic: Emerging computer-related crimes: a case study of wanacry ransomware.

Cybercrimes are becoming complex every other day. Cybercriminals are changing the tact they use because of the advancing securities of measures to protect computer and networking systems. A recent global cyber scare was the emergence of ransomware, named wanaCry. Operating as a computer virus, wanaCry would lock out a user from device and demand for ransoms. This type of cybercrime shows how committed cybercriminals are to malice and making money from malice. The work will, therefore, explore this kind of cybercrimes and discuss mitigation techniques for them.

Discussion topics

Computer related crimes – There are several types of computer-related crimes. Attacks are occasionally targeted on individual people, organizations and government agencies. From personal identity thefts to massive database breaches, attackers have different intents. This section will explore some of the most common computer-related crimes. Also, much emphasis will be made on ransomware and how they target users.

History and propagation and mitigation of wanacry – in 2017, WanaCry virus spread across several countries in the world. An estimated 200, 000 computers across the world were projected to have been targeted. The virus target machines with Windows operating systems, thus prompting Microsoft to develop a patch against it. The virus was mitigated within a month.

Measures to avoid falling prey of ransomware and other cyberattacks – there are several methods of combating cybercrimes. Organizations and individuals are occasionally made aware of these measures. Further, there is need to invest heavily is organizations are to ensure the security of their systems remains robust. From deploying intrusion detection systems, firewalls, antiviruses and antimalware’s, and promoting vigilance, organizations need to remain updated and to hire the right brains to avoid attacks.

Reference

Gollmann, D. (2011). Computer security. Hoboken, NJ: Wiley.

Ensure the paper is structured as follows

Abstract – less than 275 words

Introduction – solid 2 paged introduction

Literature review- explore discussion topics above – 6 pages total

Discussions – 1 page

Recommendations and conclusion 2 pages

References – At least 10 peer reviewed sources, include the ones mentioned above as well