Preview

Internet Security

Powerful Essays
Open Document
Open Document
1581 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Internet Security
ENG 161_03
Essay V
December 1, 2012
Internet Security and Cyber Crime / REVISION Society as a whole depends upon a basic human need for security. Over the last decade the relationship between security and society has grown complex and the balance between the two has been challenged by the introduction of the internet and digital technologies. Since the internet was developed in the 1960s to maintain communications in the event of nuclear war a lot has changed. By the 1980s, millions of computers, business and personal, were connected. Then by the 1990s e-commerce quickly expanded. Virtually every person on the planet has access to this cyber world and is free to conduct business and to communicate without borders. As businesses and lifestyles have migrated from a physical world to a digital world so have the criminal elements. The growth of cybercrime has governments, businesses, and citizens questioning laws, jurisdictions, and the need to take a stand on their approach to cyber security. The question of whether or not cybercrime is a serious problem remains a hotly contested topic. By definition, cybercrime is a crime related to technology, computers, and the internet. The most publicized cybercrimes that concern governments, businesses and citizens include: 1) Cracking, gaining unauthorized access to computer systems to commit a crime, 2) Phreaking, obtaining free telephone calls or having calls charged to different account by using a computer,
3) Cyberstalking, harassing and terrorizing selected human and institutional targets using the computer, causing them to fear injury or harm, 4) Cyberpornography, producing and/or distributing pornography using a computer, 5) Cyberterrorism: unlawful attacks and threats of attack by terrorists against computers, networks, and the information stored therein to intimidate or coerce a government or its people to further the perpetrator’s political or social objectives (Schell), 6) Cyberbullying: (which has not yet



Cited: Bowling, Brian. "Internet Crime a Growing Worry." Greensburg: Tribune Review, 30 October 2012. B1 and B10. Print. Floreno, J. "Computer Crimes." American School and University [serial online] February 2011: 34-36. Web. 12 November 2012. Gerdes, L., Book Editor. Cyber Crime. Farmington Hills: Greenhaven Press, 2009. Print. Kim, Hal J.,. "Online Social Media Networking and Assessing Its Security Risks." International Journal of Security and Its Applications (2012): 11-18. Web. 12 November 2012. Mustacchi, J. "R U Safe?" Educational Leadership 2009: 78-82. Web. 12 November 2012. Schell, B. and Martin, C. Cybercrime. Santa Barbara: ABC-CLIO, Inc., 2004. Print.

You May Also Find These Documents Helpful

  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Koenig, Dan. (2002). Investigation of Cybercrime and Tehnology-related Crime. The National Executive Institute Associates Leadership Bulletin. Retrieved November 12, 2005 from, www.neiassociates.org/cybercrime.htm…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Ngafeeson, M. (2010). Cybercrime Classification: A Motivational Model . Edinburg: College of Business Administration, The University of Texas-Pan American.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Better Essays

    Technology is getting more advanced in today’s world, but with it comes new problems and dangers; cyberstalking is no exception. Cyberstalking is a new way of stalking or harassing an individual that spawned from the use of the Internet (Cyberstalking, 2010). The Internet has given any user the ability to gain access to other peoples’ information, contact a person or group, or even damage another person’s computer or equipment. Along with the evolution of technology, laws have been created and/or revised to regulate wrongful activities or behavior that are spawning from the new technology.…

    • 1263 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    There is little debate that electronic technology including computers and the Internet are one of the most important developments of recent times. Tasks that took days to complete and that demanded hundreds of man hours to effectively execute can now be easily done at the touch of a button. But the growing importance of technology is not without its drawbacks with probably the most major one being internet and computer enabled crime.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Internet Safety

    • 1165 Words
    • 5 Pages

    When browsing on the internet, we rarely think about how the internet came to existence. We often go about our routine lives and don’t think about how the internet today has made it so convenient for people to get in touch with one another. This in turn has frequently led many people to having their identities stolen and also experienced being victims of online sexual predators. In this paper, we will discuss how with the evolution of the internet today, more people are able to get in touch with one another; therefore leading to the the harsh reality and safety precautions one can take when being online.…

    • 1165 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Technologies such as cellular phones, pagers, home computers, the Internet, websites, and palm pilots have added another dimension to crime. That dimension involves increased methods at criminals disposal to commit certain crimes along with increased locations in which crimes can occur. Hackers use to look for fame with a splashy, large-scale attack on a network that made headlines. Today 's cybercriminals are quietly taking over vulnerable web sites as part of an elaborate process in the underground economy. A highlighted section is something can change the motivation of hackers. The hackers have moved from hacking attempts that are being done for notoriety to hacking for criminal intent and fraud. While early hackers wanted to make a big splash by attacking as many computers as possible in a show of genius and ability for taking down network, now criminals do not want to be detected. Takeovers are done in a slow, methodical fashion. By not being caught, they can use the systems they have taken over for a variety of purposes. How are cybercriminals working today, and what do you need to know to stay on top with your security strategy. Cybercriminals are sneakier, and quite. Malware infected systems are used as network of bots for a wide variety of inappropriate activities. A program that uses “Bots,” can do denial of service attacks, they can be used to send out spam, and to send out phishing data…

    • 1750 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Eric J. S. and W. P. Reilly (2000) Cyber-Crimes: A Practical Approach to the Application of Federal Computer Crime Laws. Retrieved 18th February, 2012, from World Wide Web…

    • 1265 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cybercrime

    • 3743 Words
    • 15 Pages

    Internet, though offers great benefit to society, also present opportunities for crime using new and highly sophisticated technology tools. Today e-mail and websites have become the preferred means of communication. Organizations provide Internet access to their staff. By their very nature, they facilitate almost instant exchange and dissemination of data, images and variety of material. This includes not only educational and informative material but also information that might be undesirable or anti-social. Regular stories featured in the media on computer crime include topics covering hacking to viruses, web-j ackers, to internet paedophiles, sometimes accurately portraying events, sometimes misconceiving the role of technology in such activities. Increase in cyber crime rate has been documented in the news media. Both the increase in the incidence of criminal activity and the possible emergence of new varieties of criminal activity pose challenges for legal systems, as well as for law enforcement. 2. Cyber Space ~ cyber crime Cyber space is a collective noun for the diverse range of environments that have arisen using the Internet and the various services. The expression crime is defined as an act,…

    • 3743 Words
    • 15 Pages
    Better Essays