Cyber Crimes

Topics: Fraud, Credit card, Identity theft Pages: 6 (902 words) Published: September 15, 2014

Cyber Crimes
Business Law 420

10/18/2013

Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking. Federal law classifies computer fraud as the use of a computer to initiate a deceitful misrepresentation of fact as an attempt to persuade another to do or refrain from doing something which causes loss. Offenders create deceptive misrepresentation in several different ways. First, criminals can modify computer data in an illegal manner. Company staff may embezzle the corporation funds by altering input data. Second, criminals can change or delete stored data. Lastly, sophisticated criminals can modify software codes and upload them into a bank’s computer system so that the bank will provide its users’ identities to the criminals. Perpetrators can then use this information to make unauthorized credit card purchases (Fraud and Related Activity, n.d.). In order to prevent cyber fraud, do not respond to junk email, do not give out any personal information via email, if you are unfamiliar with a company check them out, and check your credit reports regularly and report any discrepancies or fraudulent entries immediately (Internet Fraud Prevention Tips, n.d.). Identity theft is a crime whereby criminals impersonate individuals, usually for financial gain. In order for internet theft to occur, personal information must be revealed about the individual such as your social security number, signature, name, address, phone number, cell number or even banking and credit card information. If a crook is able to retrieve this personal information, the perpetrator is able to use the information to commit fraud in your name (Beal, 2006). Individuals can help prevent identity theft by not giving out their SSN unnecessarily. This should only be used for tax reasons, credit or employment verification. Before providing personal identifiers, know how it will be used and if it will be shared. Individuals should use a cross-cut shredder to dispose of documents with personal information, use a specialized gel pen when writing out checks and password protect your financial accounts (Identity Theft Protection Tips, n.d.). Businesses can prevent identity theft by identifying data that requires encryption, the organization should determine the information’s lifetime, select appropriate encryption technologies, set policies and procedures, identify who needs access to this information and finally train all their users on how to safeguard sensitive information (How to Prevent Identity, 2010). Cyberstalking is a technologically-based assault on a person who has been targeted specifically for that incident for reasons of anger, revenge or control. Cyberstalking can take many forms, including: harassment, embarrassment and humiliation of the victim, emptying bank accounts or other economic control such as ruining the victim's credit score, harassing family, friends and employers to isolate the victim, and scare tactics to instill fear and more (Moore, n.d.). To better protect yourself online use a gender-neutral screen name, never give your password to anyone, especially if someone sends you an instant message (IM), don’t provide your credit card number or other identifying information as proof of age to access or subscribe to a web site run by a company with which you are unfamiliar, and don’t respond to an e-mail from a stranger; when you reply, you are verifying your e-mail address to the sender (Cyberstalking, n.d.). A computer hacker is a person who develops, changes, or attempts...


References: Beal, V. (2006, September 1). How to defend yourself against identity theft. Retrieved October 18, 2013, from http://www.webopedia.com/DidYouKnow/Internet/2006/identity_theft.asp
Cyberstalking
Fraud and related activity in connection with computers. (n.d.). Retrieved October 18, 2013, from http://www.law.cornell.edu/wex/computer_and_internet_fraud
Hacking attacks - prevention
How to prevent identity theft in you business. (2010, March 30). Retrieved October 18, 2013, from http://www.inc.com/guides/2010/04/preventing-identity-theft-in-your-business.html
Identity theft protection tips
Internet fraud prevention tips. (n.d.). Retrieved October 18, 2013, from http://whpd.com/cyberfraud.htm
Janssen, C
Moore, A. A. (n.d.). What is cyberstalking. Retrieved October 18, 2013, from http://womensissues.about.com/od/violenceagainstwomen/f/Cyberstalking.htm
Robinson, E
Six common types of cyber crime. (2012). Retrieved October 18, 2013, from http://www.selectitschools.com/Articles/tabid/67/EntryId/3/Six-Common-Types-of-Cyber-Crime.aspx
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Essay about Cyber Crime
  • Cyber Crime Essay
  • Cyber Crime Essay
  • The Role of the Internet and Crime Essay
  • Essay about Cyber Crimes
  • cyber crimes Essay
  • Role of the Internet and Crime Essay
  • Essay on Cyber Crime and National Security

Become a StudyMode Member

Sign Up - It's Free