Trends in Cybercrime

Only available on StudyMode
  • Download(s) : 425
  • Published : January 10, 2012
Open Document
Text Preview
Cybercrime is nothing to new in this day and time; this has been a problem for many since the early onset of the 80’s. Although much seems to have been done to combat cybercrime over the years, criminals still have an advantage edge. With IT experts, companies see now just how important it is to involve law enforcement in the efforts to fight against computer crime. Computer cybercrime as we know it today is now used as potentially illegal activities. Many issues surrounding this kind of crime has maintain a significant profile mainly toward hacking, copyright and infringement, for the most part this type of computer crime can be placed in two different categories. Crimes that target computer networks or devices directly (i.e. malware-malicious code, denial of service attacks, and computer viruses); Richtel, M and S Robinson, 2002) and crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device (i.e. cyber stalking, fraud and identity theft, an information warfare). (Messmer, E 2002) According to the 2009 cybercrime forecast it was said that the global recession will lead to a rise of cybercrime worldwide, the attention to cybercrime was back than deflected toward more pressing economic problems,(Matthew Harwood, 2009) Describing a cybercrime trend that society is confronted with today within this paper will address the following key elements; the types of scams are associated with the cybercrime, are there certain profile that cybercriminal have who commits this type of cybercrime. Are law enforcement initiatives to combat this crime enough, the penalties for committing these crimes what are they. Trends in cyber-crime

In today business world the economy and national security have become heavily dependent on the internet, and will continue to be adversely impacted by cybercrime. With the internet being vulnerable to malicious codes, the...
tracking img