Preview

Social Crime

Powerful Essays
Open Document
Open Document
2453 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Social Crime
PART 6

Social Websites and Crimes

What is meant by the word 'Crime '?

An action or omission that constitutes an offense that may be prosecuted by the state and is punishable by law.
Illegal activities: "the victims of crime".

Social Ebsites and Crimes

Hacking

Hacking can take several forms:

Accessing - entering a network, or a page, which is intended to be private
Defacing – changing the content of another person’s Web site.
Hijacking – redirecting elsewhere anyone trying to access a particular Web site
Bombing – overwhelming a site with countless messages to slow down or even crash the server
Denial of service – running a program which sends thousands of requests to a site simultaneously, frequently from more than one source, so that the relevant server slows down considerably or preferably (from the point of view of the hacker) crashes.

Viruses

Viruses, in the broadest sense, come in three forms:

Virus: This is a code that attaches itself to a program in a computer and then reproduces itself. It can erase files or lock up a system.
Worm: This is similar to a virus but does not attach itself to files or programs in a computer. This leaves it free to spread through a network on its own.
Trojan horse: This is a program that performs malicious actions while pretending to do something else. It is similar to a virus but does not try to reproduce itself.

Pirating

Illegal Trading

Fraud

Difamatory Libel

Cyber Stalking

NOTE: PLEASE READ THE INFORMATION YOU WILL GET ON THIS WEBSITE AND WRITE DOWN THE PARTS THAT ARE VERY IMPORTANT ACCORDING TO YOU. REMEMBER, I WILL CHECK!

http://www.rogerdarlington.me.uk/crimeonthenet.html
PART 5

Some precautionary measures that can be taken

It is inherent on the individual to use social networking constructively, and parents must be especially careful to monitor their children 's use of social networking to minimize the potential for negative outcomes. Some tips:

1.Always

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    |E-mail worms – A worm that spreads through the user of the user’s email account(s). |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Internet worms – A worm that self-replicates and self-distributes copies of itself to its host network.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Answer: Computer Hacking it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Denial of services is an attack on networks that are intended at making computer or particular service on a computer unavailable.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    When it comes to viruses and the types that get put onto your computer there are many of them. For example: the Trojan Horse, it is put into your computer by saying it is good for file converting or cleaning a system out, when it is really putting bad programs into your computer along with spyware and other potentially harmful programs. Just like when you go into your email and you see an…

    • 783 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Individual Assignment 1

    • 2342 Words
    • 10 Pages

    Having a strong web presence is not only important in today’s world, it is vital for survival in today’s super connected world. Companies, banks, agencies and private industries must be able to create an environment to interact with customers, government officials and other companies in order to thrive. Opening yourself up to anyone through the Internet often means opening your system up to the world. Today we are more connected than ever, and cyberspace is littered with a multitude of individuals, some with the intent to compromise network confidentiality, integrity and availability. Anyone with a computer and Internet access can become a victim or criminal over the web. As a result, networks and servers are under constant attack these days. Attackers are changing their techniques daily and are on a never ended endeavor to disrupt companies for their selfish reasons. Two such forms of disruption are Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These forms of disruption have cost companies millions of dollars and are showing no signs of stopping. That is why it is up to security professionals to create the best safeguards and impose efficient and proper techniques to prevent, mitigate and discover these attacks before they inflict terrible harm. In the following assignment, these important topics of prevention, mitigation and discovery will be discussed as they relate to DoS and DDoS attacks on today’s systems. Specifically, three academic journals have been selected that relate to this topic. This essay will first briefly summarize each article that was selected and state the methods of prevention, mitigation or discovery as they relate to denial of service attacks. The second part of this essay will explore in detail the specific methods discussed in the summaries as they relate to a proposed technique and practical…

    • 2342 Words
    • 10 Pages
    Best Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    DoS DDoS

    • 1875 Words
    • 11 Pages

    known as a botnet. The main difference between a DDoS attack vs. a DoS attack,…

    • 1875 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Crime Affecting Society

    • 980 Words
    • 4 Pages

    Laws are set and punishments given, but what are they given for? Many may define crime as only something as severe as murder, while other will include that crime is a violation of any law; a breech of contract. Both definitions are correct; however when summed up, “crime is an action or an instance of negligence that is deemed injurious to the public welfare or morals or the interests of the state and that is legally prohibited” (dictionary.com). Each state, province, country and continent has its own set of definitions for crime. While some acts such as smoking marijuana, or may be legal in some places, others may consider those a serious crime. Severity of a crime depends on the laws and regulations that it broke.…

    • 980 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    In this essay we shall look at what crime is, what social problems are, and what sociological problems are , how they overlap and we will also look into what sociologists do and look into Robert Merton’s strain theory, and also other sociologists views like William Chambliss’s ‘roughnecks and saints’.…

    • 1954 Words
    • 8 Pages
    Powerful Essays