Preview

Anthany Nilhas RN IU315

Satisfactory Essays
Open Document
Open Document
533 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Anthany Nilhas RN IU315
Anthany Nilhas
IU315

Questions:

1. (2 points) Can a meaningful distinction be drawn between hacking and "cracking"?
Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.

2. (1 point) What is meant by "active defense hacking" or "counter hacking"?
It is meant that hackers can use the computers of innocent persons as host computers to initiate their attacks. It is known as an act of “two wrongs making a right”.

3. (1 point) What, exactly, is cybercrime?
It is defined as a generic term covering a multiplicity of crimes found in penal code or in legistration having the use of computer technology as its central component.

4. (3 points) Identify and briefly describe the three categories of "genuine cybercrime" that was examined.
The first category is cyber privacy which is using cyber technology in unauthorized ways to reproduce copies of proprietary software or distribute proprietary information across a computer network. The next category is cyber trespass which is using cyber technology to gain or exceed unauthorized access to an individuals or organization computer system, or password-protected web site. The last category is cyber vandalism which is using cyber technology to unleash one or more programs that disrupt the transmission of electronic info across one or more computer networks, including the internet, also to destroy data resident in a computer or damage a computers resources.

5. (2 points) How might we distinguish between cyber-related crimes that are "cyber-exacerbated" and those that are "cyber-assisted"?
Cyber exacerbated is cyber stalking, internet pedophilia, or internet pornography. Cyber assisted online tax fraud, or physical assault with a computer. It also is a property damage using a computer hardware.

6. (1

You May Also Find These Documents Helpful

  • Good Essays

    ACC 497 Final Exam

    • 2281 Words
    • 11 Pages

    16) What would be the best explanation for the absence of complete information on computer crime?…

    • 2281 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    • CYBERCRIME is formally defined as any criminal action perpetrated primarily through the use of a computer. • CYBERCRIMINALS are individuals who use computers, networks, and the Internet to perpetrate crime. • The existence of cybercrime means that computer users must take precautions to protect themselves.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Criminal Justice Final

    • 1252 Words
    • 6 Pages

    * cybercrime: The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet…

    • 1252 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Crime Theories

    • 353 Words
    • 2 Pages

    The purpose of this paper is to select one (1) of the theories suggested to be the cause of digital crime and explain the theory in your own words as it relates to crime in general, and describe why the theory chosen could be recognized as the most relevant in terms of being a cause of digital crime.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    Cyber fraud can be defined as the use of software or internet services to defraud victims or taking advantage of them. This includes stealing information that is considered personal, in what constitutes identity theft. One of the most common forms of internet fraud entails distributing rogue security software. Internet technology has created the allowance for criminals to carry out fraudulent transactions, as well as transmit the proceeds of the frauds to other institutions. Cyber frauds occur in message boards, websites, emails and even chat rooms (Messner, 2012).…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    After reviewing the slideshow presentation in week fours learning activity I learned that cybercrime is the theft and destruction of information, resources, or funds by way of computers. (Siegel, Introduction to Criminal Justice, 2011) There are three types of cybercrimes; cyber theft, cyber vandalism, and cyber welfare. Cybercrime is increasing in the United States.…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Citizens Partnership’s website identified the following as their 3 categories: using the computer to help an individual commit a crime, focusing on the computer as the victim, and using a computer to harm or steal. However, the Cross Domain Solutions stated people, property and government as their 3 categories of Cybercrimes. Some cybercrimes police must be prepared to deal with in the future are theft/identity theft, hacking, fraud/financial crimes, harassment/stalking, trafficking (human & drugs), child soliciting/abuse, and cyberterrorism. Below show how the different types are divided up into the 3…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    According to Posadas(2013), what many of these little learners (and their parents) do not know, however is that they might be losing a portion of their privacy with each log-in or site visit, e-mail sent, downloaded application, or simply clicking a button.…

    • 635 Words
    • 3 Pages
    Good Essays