Talk:Computer crime countermeasures

DYK instructions
This article should be eligible for appearing on the main page as a "Did you know" entry, if it is nominated it soon; it is supposed to be nominated within 5 days of being created or significantly (5x) expanded.

The instructions for nominating it are at Template talk:Did you know. Basically, all you need to do is take this code if you created a new article:

or this code if you expanded it

and write the hook, a concise and interesting bit of info from the article beginning with "... that" and ending with a question mark. The info from the hook has to be present in the article and supported (in the article) with a citation. Someone will double-check to make sure the source says what it's claimed to say.

Once you've come up with a hook, fill in your username as the author and fill the title of the article, then add the above code, including your hook following the "hook=" part, to the top of the appropriate section for the day the article was started on the DYK template talk page. The code will produce an entry formatted like the others. After that, just keep an eye on the entry; if anyone brings up an issue with it, try to address it. I'll keep an eye out as well. If everything goes well, it will appear on the Main Page for several hours a few days from now.

--Sage Ross - Online Facilitator, Wikimedia Foundation (talk) 16:18, 27 April 2011 (UTC)

A few comments on the entry
This entry is coming along well. You may want to mention identity theft as one form of cybercrime. Also, you may want to revisit the terms "cybercrime" and "cyber warfare". I believe it is rather unusual to classify finanfial theft under cyber warfare. Espionage might be one form, but industrial espionagoe often will not be considered a form of cyber warfare. On the other hand, DDoS attacks on a nation's information infrastructure, such as the attack on Estonia in 2007, would be considered cyber warfare. --JMBauer (talk) 17:53, 30 April 2011 (UTC)

Review from CMTucker
Very in depth article that covers quite a few different angles on cybercrime and countermeasures. I would have to disagree with JMBauer about industrial espionage not being cyber warfare. I have heard administration officials state that attacks on business interests in the country that have an impact on the livelihood of the country's citizens is indeed an act of cyber warfare. Otherwise, state operators could operate through intermediary businesses and claim it is not cyber warfare (in which case the "warfare" designation may trigger more robust responses such as actual violence). CMTucker (talk) 14:42, 3 May 2011 (UTC)

Peer review from Carl67LP
Kick-butt article, Drew! The only quibble I have is the initial introduction. It takes you until the third paragraph to mention countermeasures. I think what I'd do instead is have a brief lead-in that strips out most of this content and moves it to a section after the table of contents; then, in the "new" intro (at the top of the page), I'd have something fairly simple that quickly ties together the terms "cybercrime" and "countermeasures." As it is, on initial reading it looks like the article will be about cybercrime only.

A really, really nice job.

Carl67lp (talk) 00:41, 3 May 2011 (UTC)

Issues
First of all, this duplicates parts of Computer crime, some of it is duplicated verbatim. And the "countermeasures" part discusses only the United States. Hairhorn (talk) 01:00, 10 May 2011 (UTC)

Revision
A colleague of mine and I are intending to add to this article. Specifically, we found the section on identity theft to be weak. We intend to outline how identity theft can be committed, how the US government gets around privacy laws to track down identity thefts. This will also include the privacy protection laws that try to protect citizens from identity theft. This will round out the article quite a bit. Any suggestions or recommendations are welcome. — Preceding unsigned comment added by Dsullivan7 (talk • contribs) 21:45, 21 September 2011 (UTC)

Revisions Made
Amanda and I made the following changes to the article:

We expanded the "Malicious Code" section to include a more thorough definition of Malware and Spyware. Both of these terms were ill-defined in the previous article.

Under the "Network Attacks" section we classified the 4 different forms of attacks. We also included defining attacks as being either passive or active. This adds to what was written before, which simply listed out the common types of network attacks.

We expanded the "Technical" section to include a section called Counter-Terror Social Network Analysis and Intent Recognition or CT-SNAIR. This section discusses the use of TADL which is used to model terrorist networks and attacks. This section also includes a reference to Intent Recognition or IR. This entire section was omitted in the previous article.

Under the "Legal" section, we added the Internet Spyware Prevention Act, the Identity Theft and Assumption Deterrence Act, and the Gramm-Leach-Bliley Act which weren't included in the previous article at all. We also expanded on the Computer Fraud and Abuse Act. We defined exactly what the 2002 updates to the Computer Fraud and Abuse Act did. These updates were mentioned in the previous article, but not fully explained.

Under the "Behavioral" section, we included parts about services States provide to victims of identity theft. This also includes countermeasures that financial institutions like banks are enforcing to ensure that identity is certified before any transactions. We also included a section about how biometrics are being increasingly used as verification by these institutions.

Dsullivan7 (talk) 00:20, 28 September 2011 (UTC)

Observer
I think you guys have done a great job with expanding the sections and adding legal information. Spyware and identity theft are two very important subjects that shouldn't be overlooked in an article about cyber crime. Jay3460 (talk) 06:27, 29 September 2011 (UTC)

Thanks for the feedback, I'm glad you had positive words to say. Let me know if you have further comments on what looks good and what we can improve. Dsullivan7 (talk) 02:10, 4 October 2011 (UTC)

Wall Street Journal resource
Banks Unite to Battle Online Theft; Financial Rivals Plan Coordinated Attack on Cyber Thievery; Some Still Suggest Internal Approach 10.January.2012 by Suzanne Kapner (page C1); excerpt ... 97.87.29.188 (talk) 23:39, 10 January 2012 (UTC)

Cybercrime vs Cyber crime?
Which is the preferred usage? I don't mind which but we should be consistent. A google trends search has them fairly level pegged Deku-shrub (talk) 20:28, 28 August 2015 (UTC)

External links modified
Hello fellow Wikipedians,

I have just modified 3 external links on Cybercrime countermeasures. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20130922033306/http://www.spywareloop.com/news/cybercrime-and-countermeasures to http://www.spywareloop.com/news/cybercrime-and-countermeasures
 * Added archive https://web.archive.org/web/20111004235015/http://www.hitrust.com.hk/whitepaper/1/whitepaper_Understanding_Network_Vulnerability.pdf to http://www.hitrust.com.hk/whitepaper/1/whitepaper_Understanding_Network_Vulnerability.pdf
 * Added archive https://web.archive.org/web/20120323124111/http://www.cspri.seas.gwu.edu/Presentations%20and%20Recordings/Cordes%20Economics%2C%20Cyber%20Security%20and%20Cyber%20Security%20Policy.pdf to http://www.cspri.seas.gwu.edu/Presentations%20and%20Recordings/Cordes%20Economics%2C%20Cyber%20Security%20and%20Cyber%20Security%20Policy.pdf

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

Cheers.— InternetArchiveBot  (Report bug) 22:12, 15 August 2017 (UTC)

Simple list of practical countermeasures
Hi. I listed a few practical cybercrime countermeasures, but some editors are going around wantonly removing good material, saying there are no sources, which of course there are. The list is certainly not exhaustive, so please do improve! I have added several more to the list just now. Cheers!126.209.12.35 (talk) 14:13, 16 October 2017 (UTC)
 * This seems a bit like WP:OR to me. You may want to add to the "Behavioral" section, but definitely not in the lead. Also, WP:PROSE should be used. Also, you linked to many DAB pages, please avoid that. --Muhandes (talk) 07:14, 19 October 2017 (UTC)

Wikipedia Ambassador Program course assignment
This article is the subject of an educational assignment at Michigan State University supported by WikiProject United States Public Policy and the Wikipedia Ambassador Program&#32;during the 2011 Spring term. Further details are available on the course page.

The above message was substituted from by PrimeBOT (talk) on 16:40, 2 January 2023 (UTC)