Expanded First Year (illustrate and show effects):
Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. Such acts can lead a business or an individual to lose large amounts of money and information security, neither which they may never fully recover from.
Expanded Expert (classify and compare)
The broad range of cybercrime can be better understood by dividing it into two overall categories, defined for the purpose of this research as Type I and Type II cybercrime.
Type I cybercrime has the following characteristics:
It is generally a single event from the perspective of the victim. For example, the victim unknowingly downloads a Trojan horse which installs a keystroke logger on his or her machine. Alternatively, the victim might receive an e-mail containing what claims to be a link to known entity, but in reality is a link to a hostile website.
It is often facilitated by crimeware programs such as keystroke loggers, viruses, rootkits or Trojan horses.
Software flaws or vulnerabilities often provide the foothold for the attacker. For example, criminals controlling a website may take advantage of a vulnerability in a Web browser to place a Trojan horse on the victim's computer. (Krone, T., 2005)
Type II cybercrime, at the other end of the spectrum, includes, but is not limited to activities such as cyberstalking and harassment, child predation, extortion, blackmail, stock market manipulation, complex corporate espionage, and planning or carrying out terrorist activities. The characteristics of Type II cybercrime are:
It is generally an on-going series of events,