Preview

Cyber Crime

Powerful Essays
Open Document
Open Document
1139 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cyber Crime
Computer crime Computer crime, or cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.[1] Netcrime refers, more precisely, to criminal exploitation of the Internet.[2] Issues surrounding this type of crime have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, financial theft, and other cross-border crimes sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.[3] Contents[hide] * 1 Topology * 1.1 Spam * 1.2 Fraud * 1.3 Obscene or offensive content * 1.4 Harassment * 1.5 Drug trafficking * 1.6 Cyberterrorism * 1.7 Cyber warfare * 2 Documented cases * 3 See also * 4 References * 5 Further reading * 6 External links * 6.1 Government resources |
[edit] Topology
Computer crime encompasses a broad range of potentially illegal activities. Generally, however, it may be divided into one of two types of categories: (1) crimes that target computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.[citation needed]
Examples of crimes that primarily target computer networks or devices would include: * Computer viruses * Denial-of-service attacks * Malware (malicious code)
Examples of crimes that merely use computer networks or devices would include: * Cyber stalking * Fraud and identity

You May Also Find These Documents Helpful

  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Fat, Sick and Nearly Dead

    • 1027 Words
    • 5 Pages

    Joe Cross was one made who made a choice, a choice to change. He was over a hundred pounds overweight, had an autoimmune disease that constantly got in the way of his life, and was taking loads of different medicines to fight off all his conditions that were brought on by both the weight and his autoimmune disease. So, this one man started a journey, a journey across America for sixty days drinking nothing but juice. This one man, not only saved his own life, but also through reaching out to others, began to help others begin their own journeys to a healthier, happier life.…

    • 1027 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Cyber crime paper

    • 1066 Words
    • 3 Pages

    The difference between cybercrime and traditional crime are: Cybercrime is a type of crime that not only destroys the security system of the county but also the financial system of individuals or businesses. Cybercrime is done by hackers that crack into computers and steal software, credit card information or bank account information. When cybercrime is involved, the ultimate goal for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for illegally accessing a computer system ranges from 6 months to 5 years or a fine. The penalty for computer hacking depends on many factors the age of the hacker, the system they hack into and the motivation for hacking into the system. Traditional crime on the other hand is a crime against public law. It is a physical hands on crime such as; rape, property crime; or committed with a weapon.…

    • 1066 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Trends in Cybercrime

    • 1077 Words
    • 5 Pages

    Cybercrime is nothing to new in this day and time; this has been a problem for many since the early onset of the 80’s. Although much seems to have been done to combat cybercrime over the years, criminals still have an advantage edge. With IT experts, companies see now just how important it is to involve law enforcement in the efforts to fight against computer crime. Computer cybercrime as we know it today is now used as potentially illegal activities.…

    • 1077 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Better Essays

    WiseGeek.com defines cybercrime as “any type of illegal activity that makes use of the Internet, a private or public network, or an in-house computer system.” Examples involving this crime are: software that are designed in order to steal…

    • 794 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    After reviewing the slideshow presentation in week fours learning activity I learned that cybercrime is the theft and destruction of information, resources, or funds by way of computers. (Siegel, Introduction to Criminal Justice, 2011) There are three types of cybercrimes; cyber theft, cyber vandalism, and cyber welfare. Cybercrime is increasing in the United States.…

    • 741 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Many crimes that are not specifically related to computers can be substantially facilitated by the use of computers. The easy access of cyberspace can provide a low-cost high-connectivity way for criminals to reach victims.…

    • 238 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psychology Learning Paper

    • 378 Words
    • 2 Pages

    A desirable behavior that I would like strengthen a lot would be my studying and homework habits. I would like to study or do homework for a designated hour every night. When I come home from work, I want to grab my books and go straight to the library for at least an hour. I selected this behavior because I believe that I need to dedicate more time to my school work. I have always waited until the last minute to study and do homework; therefore, having a set time of day every day to do my work will help me keep track of everything going on.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    management of technology

    • 1926 Words
    • 8 Pages

    Technology Management is set of management a discipline that allows organizations to manage its technological fundamentals to create competitive advantage. The focus is on technology as the primary factor in wealth creation, involves more than just money, enhancement of knowledge, effective exploitation of resources, preservation of natural environment and other factors that may contribute to raising standard of living and quality of life. Also involves assuming responsibilities for creating, acquiring and spinning out technology to aid human endeavors and satisfying customer needs.…

    • 1926 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Since the 1970s, there has been a growing consensus that existing laws covering the variety of crimes that can be committed using a computer either do not cover some computer abuses or are not clear enough to discourage computer-based crimes or do not ensure expeditious prosecution. Computer-based crimes are in general committed by individuals. Organised criminal groups are also active in this area.…

    • 1811 Words
    • 8 Pages
    Powerful Essays