Talk:Computer crime countermeasures

Latest comment: 1 year ago by PrimeBOT in topic Wikipedia Ambassador Program course assignment

DYK instructions edit

This article should be eligible for appearing on the main page as a "Did you know" entry, if it is nominated it soon; it is supposed to be nominated within 5 days of being created or significantly (5x) expanded.

The instructions for nominating it are at Template talk:Did you know. Basically, all you need to do is take this code if you created a new article:

{{subst:NewDYKnom| article= | hook=... that ? | status=new | author=  }}

or this code if you expanded it

{{subst:NewDYKnom| article= | hook=... that ? | status=expanded | author= }}

and write the hook, a concise and interesting bit of info from the article beginning with "... that" and ending with a question mark. The info from the hook has to be present in the article and supported (in the article) with a citation. Someone will double-check to make sure the source says what it's claimed to say.

Once you've come up with a hook, fill in your username as the author and fill the title of the article, then add the above code, including your hook following the "hook=" part, to the top of the appropriate section for the day the article was started on the DYK template talk page. The code will produce an entry formatted like the others. After that, just keep an eye on the entry; if anyone brings up an issue with it, try to address it. I'll keep an eye out as well. If everything goes well, it will appear on the Main Page for several hours a few days from now.

--Sage Ross - Online Facilitator, Wikimedia Foundation (talk) 16:18, 27 April 2011 (UTC)Reply

A few comments on the entry edit

This entry is coming along well. You may want to mention identity theft as one form of cybercrime. Also, you may want to revisit the terms "cybercrime" and "cyber warfare". I believe it is rather unusual to classify finanfial theft under cyber warfare. Espionage might be one form, but industrial espionagoe often will not be considered a form of cyber warfare. On the other hand, DDoS attacks on a nation's information infrastructure, such as the attack on Estonia in 2007, would be considered cyber warfare. --JMBauer (talk) 17:53, 30 April 2011 (UTC)Reply

Review from CMTucker edit

Very in depth article that covers quite a few different angles on cybercrime and countermeasures. I would have to disagree with JMBauer about industrial espionage not being cyber warfare. I have heard administration officials state that attacks on business interests in the country that have an impact on the livelihood of the country's citizens is indeed an act of cyber warfare. Otherwise, state operators could operate through intermediary businesses and claim it is not cyber warfare (in which case the "warfare" designation may trigger more robust responses such as actual violence). CMTucker (talk) 14:42, 3 May 2011 (UTC)Reply

Peer review from Carl67LP edit

Kick-butt article, Drew! The only quibble I have is the initial introduction. It takes you until the third paragraph to mention countermeasures. I think what I'd do instead is have a brief lead-in that strips out most of this content and moves it to a section after the table of contents; then, in the "new" intro (at the top of the page), I'd have something fairly simple that quickly ties together the terms "cybercrime" and "countermeasures." As it is, on initial reading it looks like the article will be about cybercrime only.

A really, really nice job.

Carl67lp (talk) 00:41, 3 May 2011 (UTC)Reply

Issues edit

First of all, this duplicates parts of Computer crime, some of it is duplicated verbatim. And the "countermeasures" part discusses only the United States. Hairhorn (talk) 01:00, 10 May 2011 (UTC)Reply

Revision edit

A colleague of mine and I are intending to add to this article. Specifically, we found the section on identity theft to be weak. We intend to outline how identity theft can be committed, how the US government gets around privacy laws to track down identity thefts. This will also include the privacy protection laws that try to protect citizens from identity theft. This will round out the article quite a bit. Any suggestions or recommendations are welcome. — Preceding unsigned comment added by Dsullivan7 (talkcontribs) 21:45, 21 September 2011 (UTC)Reply

Revisions Made edit

Amanda and I made the following changes to the article:

We expanded the "Malicious Code" section to include a more thorough definition of Malware and Spyware. Both of these terms were ill-defined in the previous article.

Under the "Network Attacks" section we classified the 4 different forms of attacks. We also included defining attacks as being either passive or active. This adds to what was written before, which simply listed out the common types of network attacks.

We expanded the "Technical" section to include a section called Counter-Terror Social Network Analysis and Intent Recognition or CT-SNAIR. This section discusses the use of TADL which is used to model terrorist networks and attacks. This section also includes a reference to Intent Recognition or IR. This entire section was omitted in the previous article.

Under the "Legal" section, we added the Internet Spyware Prevention Act, the Identity Theft and Assumption Deterrence Act, and the Gramm-Leach-Bliley Act which weren't included in the previous article at all. We also expanded on the Computer Fraud and Abuse Act. We defined exactly what the 2002 updates to the Computer Fraud and Abuse Act did. These updates were mentioned in the previous article, but not fully explained.

Under the "Behavioral" section, we included parts about services States provide to victims of identity theft. This also includes countermeasures that financial institutions like banks are enforcing to ensure that identity is certified before any transactions. We also included a section about how biometrics are being increasingly used as verification by these institutions.

Dsullivan7 (talk) 00:20, 28 September 2011 (UTC)Reply

Observer edit

I think you guys have done a great job with expanding the sections and adding legal information. Spyware and identity theft are two very important subjects that shouldn't be overlooked in an article about cyber crime. Jay3460 (talk) 06:27, 29 September 2011 (UTC)Reply

Thanks for the feedback, I'm glad you had positive words to say. Let me know if you have further comments on what looks good and what we can improve. Dsullivan7 (talk) 02:10, 4 October 2011 (UTC)Reply

Wall Street Journal resource edit

Banks Unite to Battle Online Theft; Financial Rivals Plan Coordinated Attack on Cyber Thievery; Some Still Suggest Internal Approach 10.January.2012 by Suzanne Kapner (page C1); excerpt ...

This month, security officials from Wall Street financial firms, including Morgan Stanley and Goldman Sachs Group Inc., are expected to meet with researchers from the Polytechnic Institute of New York University to discuss the creation of a new type of center that would sift through mountains of bank data to detect potential attacks, people familiar with the situation said. At the same time, Bank of America Corp. has begun hosting experts from other major banks at quarterly informal roundtables, in which the rivals try to devise solutions to cybersecurity threats, according to other people.

97.87.29.188 (talk) 23:39, 10 January 2012 (UTC)Reply

Cybercrime vs Cyber crime? edit

Which is the preferred usage? I don't mind which but we should be consistent. A google trends search has them fairly level pegged Deku-shrub (talk) 20:28, 28 August 2015 (UTC)Reply

External links modified edit

Hello fellow Wikipedians,

I have just modified 3 external links on Cybercrime countermeasures. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 18 January 2022).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 22:12, 15 August 2017 (UTC)Reply

Simple list of practical countermeasures edit

Hi. I listed a few practical cybercrime countermeasures, but some editors are going around wantonly removing good material, saying there are no sources, which of course there are. The list is certainly not exhaustive, so please do improve! I have added several more to the list just now. Cheers!126.209.12.35 (talk) 14:13, 16 October 2017 (UTC)Reply

This seems a bit like WP:OR to me. You may want to add to the "Behavioral" section, but definitely not in the lead. Also, WP:PROSE should be used. Also, you linked to many DAB pages, please avoid that. --Muhandes (talk) 07:14, 19 October 2017 (UTC)Reply

Wikipedia Ambassador Program course assignment edit

  This article is the subject of an educational assignment at Michigan State University supported by WikiProject United States Public Policy and the Wikipedia Ambassador Program during the 2011 Spring term. Further details are available on the course page.

The above message was substituted from {{WAP assignment}} by PrimeBOT (talk) on 16:40, 2 January 2023 (UTC)Reply