1438
Copyright © 2018, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Chapter 72
DOI: 10.4018/978-1-5225-5634-3.ch072
ABSTRACT
Through commercial networks and across the Internet, there are data fles, millions of images and videos,
and trillions of messages fow each day to drive the world economy. This vast electronic infrastructure is
what our nation depends on. To commit crime by using a computer and communication to forge a person’s
identity, illegal imports or malicious programs, the computer here is used as an object or subject for the
cybercrime. Most of the online activities are vulnerable to intrusion and can compromise personal safety
just as efectively as common everyday crimes. This chapter concentrates on explaining and discussing
the terms of cyber security, cybercrimes, and cyber-attacks. A history for each term has been given and
the problems of cyber security have been discussed. Finally, a proposed solution has been suggested and
future trends have been forecasted, and at the end of the chapter a conclusion will be given.
INTRODUCTION
A new theories and terms appear to change the concepts of the economics and the role of the organi-
zations in society. Theories such as the “Blue Lake” and terms such as: Network Economics, Virtual
Organizations, E-Government, E-Business, and Internet of Things are dependent, in general, on the
Internet and Information Technology. New technology always brings new threats and here, security is
the main concern for these technologies.
The advances of computers and communications have changed our life and habits. Everything now
relies on those developed technologies (computer and Internet), communication (email, mobile phones),
transportation (airplane navigation, car engine systems), shopping (e-commerce, credit cards, and online
stores), medicine (medical records, equipment), entertainment (mp3s, digital cable) and the list goes on.
We can see that our daily lives rely on computers. Also, much of our personal information is stored and
processed on our own computers or on someone else’s system. The objective of cyber security is to protect
and defend that information by detecting, preventing, and responding to cyber-attacks (Ramkumar, 2014).
Proposals to Win the Battle
Against Cyber Crime
Alaa Hussein Al-Hamami
Amman Arab University, Jordan