Preview

cyber crime and targets

Powerful Essays
Open Document
Open Document
1831 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
cyber crime and targets
Cyber-crimes and targets

Computer forensics

January 11, 2014

Ann Wray-day

The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired. There is a line that often blurs between legitimate and illegal behavior, when does harsh criticism become bullying, when does an expression of affection become harassment and how do the authorities differentiate between someone looking up an old classmate for rekindle a friendship and stalking a former girlfriend that spurned their overtures. The constitutional protections of free speech and requirements of specificity of regulations make the criminalization of inappropriate behavior.
CAUSES OF CYBER – CRIME
There are many reasons why cyber-criminals commit cyber-crime, chief among them are these three listed below: Cyber-crimes can be committed for the sake of recognition. This is basically committed by youngsters who want to be noticed and feel among the group of the big and tough guys in the society. They do not mean to hurt anyone in particular; they fall into the category of the Idealists; who just want to be in spotlight.
Another cause of cyber-crime is to make quick money. This group is greed motivated and is career criminals, who tamper with data on the net or system especially, e-commerce, e-banking data information with the sole aim of committing fraud and swindling money off unsuspecting customers.
Thirdly, cyber-crime can be committed to fight a



References: Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing. Network ICE Corporation (1998-2000). Password theft [On-line]. Available: http://www.netice.com Niccolai, J. (02/11/2000). Analyst puts recent hacker damage at $1.2 billion and rising [On-line]. Available: http://www.nwfusion.comn/news Real Secure (2001). [On-line]. Available: http://www.securehq.com Schindler, D.J. (2000, March). E-Crime and what to do about it. Los Angeles Business Journal. SilentRunnerTM. SilentRunnerTM [On-line]. Available: http://www.silentrunner.com/about/index.html. Teach, E. (1998, February). Look who 's hacking now. CFO, The Magazine for Senior Financial Executives.

You May Also Find These Documents Helpful

  • Good Essays

    Eber

    • 873 Words
    • 3 Pages

    During the time of the newly born America, many disputed over the way the country should be ran. There were those who favored a federalist government and those who opposed it. George Clinton held a very strong position to why he was antifederalist ultimately believing that a weak central government would allow the voice of the people to be heard better while James Madison favored the federalist government because of the capability of equal representation. Although at first glance the positions these two have seem similar, there are very distinctive rationales to why they had to separate opinions.…

    • 873 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    For example, theft has been turned to cybercrime as criminals can steal personal information online, rather than in physical form. Other threats such as terrorism have the potential to turn into major cyber threats and affect all of the United States. People are being targeted and tricked into providing criminals with personal information. More companies are turning to the online world in providing customers with information about their accounts, such as online banking and paperless bill pay. Companies are being hacked, and large amounts of personal information are stolen. Criminals have it easier to commit crimes than ever before because they can do so without ever leaving the comfort of their home. Criminals are turning to cybercrime for a variety of reasons. One reason criminals are interested in cyber crime is because it is stealthier and cannot be traced easily, as there are several types of software and programs available to mask or hide real locations. Cyber crimes are much harder to determine where and who they come…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    There are several different theories that could be used to describe those who commit computer crimes. I am going to summarize Choice Theory and why I think it is most relevant to computer crimes. The Choice Theory basically in a nut shell says that a person will choose to commit a crime even after weighing the positive and negative outcomes of doing so. To this person they see a quick opportunity to make money or cause a disruption and no matter what the consequence will still choose to offend. There are other types of crimes that could be related to this theory as well such as theft, burglary and robbery. When…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    2. R, Riva. (2011). What to Do If Your Business Gets Hacked. Available: http://businessonmain.msn.com/browseresources/articles/onlinebusiness.aspx?cp-documentid=31726409#fbid=vputcsjXLR_?comments. Last accessed 30th July 2013.…

    • 1963 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    Crime Theories

    • 353 Words
    • 2 Pages

    The purpose of this paper is to select one (1) of the theories suggested to be the cause of digital crime and explain the theory in your own words as it relates to crime in general, and describe why the theory chosen could be recognized as the most relevant in terms of being a cause of digital crime.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    On December 6,1894, “The Story of an Hour” by Kate Chopin was published. “ The Yellow Wallpaper, by Charlotte Gilman was written in 1892. Kate Chopin and Charlotte p. Gilman were two influential writers during the Women's Rights Movement. Both short stories teach the readers about the dissatisfaction of women in marriage. Men were a burden on women and kept women from happily living their lives.…

    • 1542 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    FINAL DRAFT CYBERCRIME CJ

    • 667 Words
    • 3 Pages

    Cyberspace has been traditionally defined as the exchange of information and communication from one person to another in completely different geographical locations (Britz, 2013, p.3). According to Britz cyberspace was defined as “the place between places” (Britz, 2013, p.3). Therefore, cyberspace represents the cloud where emails, calls, and, text messages must pass through before making it to its final destination. Cyberspace has been used since traditional communication devices were first introduced (Britz, 2013, p.3). Approximately half of the United States have used the Internet as a medium (Britz, 2013, p.3). However, with the wave of the Internet, criminals found new ways to commit crimes with less risk of getting caught. According to Britz computer crime, computer-related crimes, digital crimes, and cybercrime must be studied in order to understand technological and electronic crimes (Britz, 2013, p.3).…

    • 667 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Robbery, rape, homicide, etc. are being joined by another threat. The increase in popularity of the Internet over the years has resulted in the creation of a new type of crime, cybercrime. With that, came along a new concern: the need for safety and surveillance on the Internet. This has created a certain type of Panoptic society and displays the way in which people are subject to behave when they know that a higher power such as the Federal Government and even local law enforcement agencies have the ability to access their information via computer systems. Cybercrime can be defined in many ways whether it’s money laundering, bullying, fraud, or stalking.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Digital Crime Theories

    • 898 Words
    • 4 Pages

    Various theorists have attempted to explain the cause of crime, in general, using various theories. In the current digital world of technology, these theories have been modified to explain why people commit digital crimes. Similar to other forms of crimes, theorists claim that there are specific reasons as to why people commit a digital crime. This paper aims at explaining digital crime and the various theories that explain why people engage in digital crime.…

    • 898 Words
    • 4 Pages
    Good Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Good Essays

    In the wake of recent high-profile data breaches involving JP Morgan Chase, Home Depot, and Target show people how vulnerable they are becoming when shopping online.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To compound matters, tormenters regularly go for the overall public, the all-inclusive community who cannot so adequately dissuade harmful words. One thing prompts another, and in the direst result comprehensible, the victim resorts to taking their own life. There have been studies done on the association amongst cyberbullying and suicide rates. The ensuing conclusions are aggravating and disturbing. The web is excluded absolutely of extreme adults. There are more energetic adults, youngsters, even adolescents on the web. With all that has starting now been done to guarantee the more truly frail web, making laws that make cyberbullying unlawful seems like a wise next step, considering the damage that has starting now been done and the mischief that will continue to hurt and destroy the lives of others if new measures are not taken. This…

    • 497 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    3. McQuade, Samuel C.; Gentry, Sarah E.; Fisk, Nathan W. (Editor). Cybersafety : Cyberstalking and Cyberbullying.New York, NY, USA: Facts on File, Inc., 2012. p 61.…

    • 1116 Words
    • 5 Pages
    Powerful Essays

Related Topics