UNIVERSITY OF MARYLAND UNIVERSITY COLLEGE |
The Impact of Cybercrimes on Organization Supply Chains |
ASCM 630 Research Paper |
TurnItIn Originality Score: 27% |
April Dorsey |
The paper must follow APA format, be written on an approved topic related to the course, and include discussion of how the topic relates to Acquisition and Supply Chain Management. The paper must list and discuss a minimum of 10 scholarly references (other than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. |
This paper will discuss the impact of cyber crimes on organization supply ...view middle of the document...
Other department processes will be discussed later in further detail.
However, over the years there have been advances in security procedures, such as cyber threat detection training, to help subdue the frequency of cyber crimes; various legislation bills have been passed as well. But for these advanced security procedures to work, companies must constantly try to be more proactive, rather than reactive. If not, then you will constantly be putting your company at risk, on all levels.
Since the emergence of the computer and World Wide Web, there has been ample opportunity “…for persons to engage in a new form of crimes called cyber crimes. This new technology allowed criminals to commit existing crimes using a new medium” (Cheeseman, 2010). This paper will discuss the impact of cyber crimes on acquisition and supply chain management functions, and the steps that need to be taken to improve supply chain security. Appendix A summarizes how this can be done. During these current times, it is getting easier and easier for computer hackers and frauds to access confidential information from anyone, anywhere in the world. Regarding business organizations, they “may lose the confidence of customers who worry about the security of their business transactions” (Smith, Smith, and Smith, 2011). But firms can combat cybercrime by always being proactive, rather than reactive.
A BREAKDOWN OF CYBERCRIMES
Cybercrime is defined as criminal activity conducted while using the computer and Internet. “Troublemakers in cyberspace seek systems to infiltrate and misuse. Just for the fun of it, there are some people who try to hack into a business firm’s computer system. Once access to the system is achieved, intruders can potentially cause major problems by deleting or changing data” (Smith, Smith, and Smith, 2011). They also break into an organization’s system to stop it from working, or steal non-financial information, like intellectual property or strategy and design ideas. In fact, in 2010, the Internet Crime Complaint Center reported a 31.1% rate of complaints from victims of cybercrimes (“FBI 2010 Cybercrime Statistics”, 2011).
How access is gained
In addition to downloadable programs used against the most secure systems, ThriveNetworks.com, a Staples company, discusses the most common way hackers use to do their dirty work, which is through a “backdoor”. Some types of cybercrimes that can result from this are phishing, netspionage, implanting viruses, and fraud, which are discussed in detail below. Appendix B further defines these, and other cybercrime methods.
A backdoor is a way for hackers to set-up and maintain unauthorized contact with any kind of network, and continue to use the network without being detected. This is dangerous because “when the systems administrator monitors the network, the account where the hacker modified the password does not appear. This makes it difficult to determine which accounts are unused and should be...