Preview

Hackers

Powerful Essays
Open Document
Open Document
6354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hackers
Dr. Diaz-Gomez, IT 4414

What You Need to Know About Cybercrimes

Elene Paryag & Ashre Griffin
IT Capstone - Research Paper

What You Need to Know About Cybercrimes

Elene Paryag & Ashre Griffin
IT Capstone - Research Paper

Table of Contents

Abstract ……………………………………………………………………………………. 3
Introduction ……………………………………………………………………………4 - 5
Defining the Problem …………………………………………………………………..... 6 - 7
Laws of cybercrimes ……………………………………………………………………… 7
In the U. S……………………………………………………………………….. 7 - 9
Internationally ……………………………………………………………………9
Causes of Cybercrimes & methods of committing ………………………………………. 10 - 11
Theft crimes and Terrorism ………………………………………………… 12 - 13
Companies and stats……………………………………………. ………………. 13 - 14
Preventions and Procedures……………………………………………………………….. 20- 21
Conclusion ………………………………………………………………………………… 22 - 23
References ………………………………………………………………………………….. 24 - 26

Abstract
Cybercrimes are responsible for the interruption of normal computer functions and has been known to cause the downfall of many companies and personal entities. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, laws governing them, methods of committing cybercrimes, who they affect, and cybercrime prevention procedures. More specifically, this paper will delve into one main example of cybercrime “hacking”. The report will show the usage and progression of technology has amplified different types of crimes such as theft crimes and terrorism. Also, this report will display statistical data which will give an idea of how far cybercrimes has increase over the period of ten years or more.

Introduction In our modern technology-driven age, keeping our personal information private is becoming more difficult. The truth is, highly classified details are becoming more available to public databases, because we are more interconnected than ever. Our data is available for almost anyone to sift through due to



References: 1. Center, Finjan Malicious Code Research. "Web Security Trends Report." Securing your web (1996-2008): 1-20. 2. eSecurity Planet. 2011. 16 January 2011 <http://www.esecurityplanet.com/trends/article.php/3871456/Cyber-Crooks-Doubled-Their-Take-in-09-FBI.htm>. 4. Justice, Bureau of Justice Assistance U.S. Department of. "Internet Crime Complaint Center." 2009 Internet Crime Report (2008): 1-26. 5. Phil Williams, Cert Coordination Center. "Implications for Business." Organized Crime and Cyber-crime (2002): 1-7. 6. SOPHOS. "SOPHOS." Security Threat Report 2009 (2008): 1-20. 7. Vanlalnunsanga, M. (n.d.). Statistical Report on Cyber Crime. Retrieved 01 29, 2011, from Scribd: http://www.scribd.com/doc/19720457/Statistical-Report-of-Cyber-Crime 8 9. Wall, David S. "Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace." Police Practice & Research 8.2 (2007): 183-205. Academic Search Premier. EBSCO. Web. 25 Jan. 2011. 10. "TREND MICRO 2011 THREAT PREDICTIONS." Computer Security Update 12.1 (2011): 1-3. Academic Search Premier. EBSCO. Web. 14 Jan. 2011. 11. Wall, David S. "Catching Cybercriminals: Policing the Internet." International Review of Law, Computers & Technology 12.2 (1998): 201-218. Academic Search Premier. EBSCO. Web. 19 Jan. 2011. 14. Stephens, Gene. "CYBERCRIME IN THE YEAR 2005." Futurist July 2008: 32+. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 15. Wall, David S. "Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime." International Review of Law, Computers & Technology 22.1/2 (2008): 45-63. Academic Search Premier. EBSCO. Web. 18 Jan. 2011. 16. Hansen, Brian, and Adriel Bettelheim. "Cybercrime: Congress Addresses the Breach In Online Security." CQ Weekly 60.26 (2002): 1761. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 17. Gomolski, Barb. "Mr. President, cybercrime is much more than just a pesky computer virus." InfoWorld 23.13 (2001): 98. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 18. Hunton, Paul. "The growing phenomenon of crime and the internet: A cybercrime execution and analysis model." Computer Law & Security Review 25.6 (2009): 528-535. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 19. National White Collar Crime Center. "IC3 2008 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf 20 21. National White Collar Crime Center. "IC3 2006 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf 22 23. National White Collar Crime Center. "IC3 2004 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2004_IC3Report.pdf 24 25. National White Collar Crime Center. "IC3 2003 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd:http://www.ic3.gov/media/annualreport/2003_IC3Report.pdf 26 27. Bureau of Justice Statistics. Retrieved 02 04, 2011, from BJS:http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=41 28 29. Richardson, R. 2003 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, 2003. 30 31. TextFiles.com. New York Penal Law. http://www.textfiles.com/law/ny_lawsta.law (accessed 15 March 2011). 32 35. Department of Justice. http://www.ncjrs.org/pdffiles1/ojp/186157.pdf (accessed 3 April 2011). 36 http://www.haltabuse.org/resources/laws/index.shtml (accessed 12 March 2011) 37

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Medicare Fraud

    • 2440 Words
    • 10 Pages

    FBI — Common Fraud Schemes. (n.d.). FBI — Homepage. Retrieved October 11, 2010, from http://www.fbi.gov/scams-safety/fraud/fraud…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Electronic evidence or digital evidence is any information stored digitally that a party in a court case may use to prove a case in a court trial. This kind of evidence has been in use in the courtrooms for some timeandmay come in the form of instant message history logs, ATM transactions, browser history, databases, and other forms of electronic materials. The reason as to why electronic evidence is gaining momentum in criminal and civil litigation is that there has been a rise in electronic communication users everyday. This all comes down to the impact of revolution within the ICT that generates an effect across all spheres including businesses, transport, and communication. These advancements in electronic communications have revolutionized communication aspects, business aspects, and the relations between friends and family.…

    • 4479 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    This article is by the FBI telling how people are accessing your information through the internet and how to protect your information.…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Research Paper Outline

    • 423 Words
    • 2 Pages

    Thesis Statement: Cybercrime is an increasing concern among individuals across the U.S. making it necessary to know how to avoid being a victim.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annonated Bibliography

    • 370 Words
    • 2 Pages

    Identity theft and Identity fraud. (2007) In the U.S. Department of Justice online. Retrieved August 27 2011 from:…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identity Theft

    • 2587 Words
    • 11 Pages

    "FTC Consumer Information - ID Theft, Privacy, & Security: Identity Theft." Federal Trade Commission. Web. 25 May 2011.…

    • 2587 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    Working with the Federal government I see daily the precautions taken to ensure that one’s identity is protected. This protection should be grant to the everyday people, as we are the ones at risk. Technology, strictly enforcing the laws against identity theft, and the purchase of a monitoring service…

    • 1645 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    paganinip . (2012). Cyberespionage and new opportunities for cybercrime. Available: http://securityaffairs.co/wordpress/3158/cyber-crime/cyberespionage-and-new-opportunities-for-cybercrime.html. Last accessed 29th Oct 2012.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    window to get into your house. He doesn't hold a gun to your head, nor does he…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Kshetri, N. (2010). The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. New York: Springer.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays

Related Topics