English

Only available on StudyMode
  • Topic: Computer crime, Fraud, Crime
  • Pages : 3 (661 words )
  • Download(s) : 76
  • Published : April 11, 2013
Open Document
Text Preview
Cyber-Crime

MC2

Table of Contents
Introduction…………………………………………………………………. Nature ………………………………………………………………………… Definition………………………………………………………………………………. Background…………………………………………………………………………… Discussion…………………………………………………………………….. History…………………………………………………………………………… Types of Cybercrime ……………………………………………………… Fraud……………………………………………………………………………………… Bullying, Harassment and Stalking…………………………………………. Computer Trespassing……………………………………………………………. Hardware Hijacking………………………………………………………………. Spam……………………………………………………………………………………… Information Warfare……………………………………………………………… Effects of Cybercrime……………………………………………………… Cybercrime Prevention…………………………………………………… Conclusion…………………………………………………………………….. Findings…………………………………………………………………………. Summary……………………………………………………………………….. Recommendation……………………………………………………………

Outline

Discussion
This section presents the topic on Cybercrime particularly on the History, Types of Cybercrime, Effects of Cybercrime and Cybercrime prevention.

History

Types of Cybercrime
This subsection discusses the different types of Cybercrime that are being used by attackers in today’s Cyber world. * Fraud
* Bullying, Harassment and Stalking
* Computer Trespassing
* Hardware Hijacking
* Information Warfare
* Spam

Effects of Cybercrime

Cybercrime Prevention

Introduction

Crime has changed in a big way over the years thanks to our insatiable appetite for technology. Bigger, faster, more efficient and more all encompassing online access means one thing to cyber criminals: easy pickings. Not only has technology changed the crimes committed, it has also radically changed the face of the actual criminal. No longer just the shady character in the background, cyber crimes, everything from embezzlement to identity theft and money laundering, are happening at the hands of everyone from the professional in the desk beside you to the quiet neighbor across the street. Because cyber crime lacks the face to face...
tracking img