The internet is went into full affect in the ear of 1990 when the Arpanet officially split into two separate networks to further facilitate usage and prevent military secrets from being found so easily. This is when the basis of cybercrime first began. There are cybercriminals which exist simply because they are drawn to the information that is contained by the World Wide Web. Nowadays, cybercriminals are much harder to track as they have evolved from the basic computer geeks who merely send viruses to another computer in efforts to crash it. They are far more advanced, and seek to steal information for their own personal gain. There are several different types of cyber criminals. They include: Script kiddies; who lack the experience to hack the larger mainframe systems. However, they are capable of doing some type of damage to unsecured systems. These types of criminals are also known as “hacker wannabes”. Also are scammers who flood one’s email with false advertisement and junk mail. The send catchy subject line for gullible victims and include links in the emails that absorb information from the victims computer. “Hacker groups usually work anonymously and create tools for hacking. They often hack computers for no criminal reason and are sometimes even hired by companies wanting to test their security” (Batke, 2011). The considered highest risk of all cyber criminals are “Insiders”. “They may only be 20% of the threat, but they produce 80% of the damage. They often reside within an organization” (Batke, 2011).The fact that there are cyber criminals establishes a new set of victims which mostly include people that
The internet is went into full affect in the ear of 1990 when the Arpanet officially split into two separate networks to further facilitate usage and prevent military secrets from being found so easily. This is when the basis of cybercrime first began. There are cybercriminals which exist simply because they are drawn to the information that is contained by the World Wide Web. Nowadays, cybercriminals are much harder to track as they have evolved from the basic computer geeks who merely send viruses to another computer in efforts to crash it. They are far more advanced, and seek to steal information for their own personal gain. There are several different types of cyber criminals. They include: Script kiddies; who lack the experience to hack the larger mainframe systems. However, they are capable of doing some type of damage to unsecured systems. These types of criminals are also known as “hacker wannabes”. Also are scammers who flood one’s email with false advertisement and junk mail. The send catchy subject line for gullible victims and include links in the emails that absorb information from the victims computer. “Hacker groups usually work anonymously and create tools for hacking. They often hack computers for no criminal reason and are sometimes even hired by companies wanting to test their security” (Batke, 2011). The considered highest risk of all cyber criminals are “Insiders”. “They may only be 20% of the threat, but they produce 80% of the damage. They often reside within an organization” (Batke, 2011).The fact that there are cyber criminals establishes a new set of victims which mostly include people that