What You Need to Know About Cybercrimes
Elene Paryag & Ashre Griffin
IT Capstone - Research Paper
What You Need to Know About Cybercrimes
Elene Paryag & Ashre Griffin
IT Capstone - Research Paper
Table of Contents
Abstract ……………………………………………………………………………………. 3
Introduction ……………………………………………………………………………4 - 5
Defining the Problem …………………………………………………………………..... 6 - 7
Laws of cybercrimes ……………………………………………………………………… 7
In the U. S……………………………………………………………………….. 7 - 9
Internationally ……………………………………………………………………9
Causes of Cybercrimes & methods of committing ………………………………………. 10 - 11
Theft crimes and Terrorism ………………………………………………… 12 - 13
Companies and stats……………………………………………. ………………. 13 - 14
Preventions and Procedures……………………………………………………………….. 20- 21
Conclusion ………………………………………………………………………………… 22 - 23
References ………………………………………………………………………………….. 24 - 26
Abstract
Cybercrimes are responsible for the interruption of normal computer functions and has been known to cause the downfall of many companies and personal entities. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, laws governing them, methods of committing cybercrimes, who they affect, and cybercrime prevention procedures. More specifically, this paper will delve into one main example of cybercrime “hacking”. The report will show the usage and progression of technology has amplified different types of crimes such as theft crimes and terrorism. Also, this report will display statistical data which will give an idea of how far cybercrimes has increase over the period of ten years or more.
Introduction In our modern technology-driven age, keeping our personal information private is becoming more difficult. The truth is, highly classified details are becoming more available to public databases, because we are more interconnected than ever. Our data is available for almost anyone to sift through due to
References: 1. Center, Finjan Malicious Code Research. "Web Security Trends Report." Securing your web (1996-2008): 1-20. 2. eSecurity Planet. 2011. 16 January 2011 <http://www.esecurityplanet.com/trends/article.php/3871456/Cyber-Crooks-Doubled-Their-Take-in-09-FBI.htm>. 4. Justice, Bureau of Justice Assistance U.S. Department of. "Internet Crime Complaint Center." 2009 Internet Crime Report (2008): 1-26. 5. Phil Williams, Cert Coordination Center. "Implications for Business." Organized Crime and Cyber-crime (2002): 1-7. 6. SOPHOS. "SOPHOS." Security Threat Report 2009 (2008): 1-20. 7. Vanlalnunsanga, M. (n.d.). Statistical Report on Cyber Crime. Retrieved 01 29, 2011, from Scribd: http://www.scribd.com/doc/19720457/Statistical-Report-of-Cyber-Crime 8 9. Wall, David S. "Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace." Police Practice & Research 8.2 (2007): 183-205. Academic Search Premier. EBSCO. Web. 25 Jan. 2011. 10. "TREND MICRO 2011 THREAT PREDICTIONS." Computer Security Update 12.1 (2011): 1-3. Academic Search Premier. EBSCO. Web. 14 Jan. 2011. 11. Wall, David S. "Catching Cybercriminals: Policing the Internet." International Review of Law, Computers & Technology 12.2 (1998): 201-218. Academic Search Premier. EBSCO. Web. 19 Jan. 2011. 14. Stephens, Gene. "CYBERCRIME IN THE YEAR 2005." Futurist July 2008: 32+. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 15. Wall, David S. "Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime." International Review of Law, Computers & Technology 22.1/2 (2008): 45-63. Academic Search Premier. EBSCO. Web. 18 Jan. 2011. 16. Hansen, Brian, and Adriel Bettelheim. "Cybercrime: Congress Addresses the Breach In Online Security." CQ Weekly 60.26 (2002): 1761. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 17. Gomolski, Barb. "Mr. President, cybercrime is much more than just a pesky computer virus." InfoWorld 23.13 (2001): 98. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 18. Hunton, Paul. "The growing phenomenon of crime and the internet: A cybercrime execution and analysis model." Computer Law & Security Review 25.6 (2009): 528-535. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 19. National White Collar Crime Center. "IC3 2008 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf 20 21. National White Collar Crime Center. "IC3 2006 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf 22 23. National White Collar Crime Center. "IC3 2004 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2004_IC3Report.pdf 24 25. National White Collar Crime Center. "IC3 2003 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd:http://www.ic3.gov/media/annualreport/2003_IC3Report.pdf 26 27. Bureau of Justice Statistics. Retrieved 02 04, 2011, from BJS:http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=41 28 29. Richardson, R. 2003 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, 2003. 30 31. TextFiles.com. New York Penal Law. http://www.textfiles.com/law/ny_lawsta.law (accessed 15 March 2011). 32 35. Department of Justice. http://www.ncjrs.org/pdffiles1/ojp/186157.pdf (accessed 3 April 2011). 36 http://www.haltabuse.org/resources/laws/index.shtml (accessed 12 March 2011) 37