Preview

Hackers

Powerful Essays
Open Document
Open Document
6354 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hackers
Dr. Diaz-Gomez, IT 4414

What You Need to Know About Cybercrimes

Elene Paryag & Ashre Griffin
IT Capstone - Research Paper

What You Need to Know About Cybercrimes

Elene Paryag & Ashre Griffin
IT Capstone - Research Paper

Table of Contents

Abstract ……………………………………………………………………………………. 3
Introduction ……………………………………………………………………………4 - 5
Defining the Problem …………………………………………………………………..... 6 - 7
Laws of cybercrimes ……………………………………………………………………… 7
In the U. S……………………………………………………………………….. 7 - 9
Internationally ……………………………………………………………………9
Causes of Cybercrimes & methods of committing ………………………………………. 10 - 11
Theft crimes and Terrorism ………………………………………………… 12 - 13
Companies and stats……………………………………………. ………………. 13 - 14
Preventions and Procedures……………………………………………………………….. 20- 21
Conclusion ………………………………………………………………………………… 22 - 23
References ………………………………………………………………………………….. 24 - 26

Abstract
Cybercrimes are responsible for the interruption of normal computer functions and has been known to cause the downfall of many companies and personal entities. This research paper aims to discuss following aspects of Cybercrimes: the definition, why they occur, laws governing them, methods of committing cybercrimes, who they affect, and cybercrime prevention procedures. More specifically, this paper will delve into one main example of cybercrime “hacking”. The report will show the usage and progression of technology has amplified different types of crimes such as theft crimes and terrorism. Also, this report will display statistical data which will give an idea of how far cybercrimes has increase over the period of ten years or more.

Introduction In our modern technology-driven age, keeping our personal information private is becoming more difficult. The truth is, highly classified details are becoming more available to public databases, because we are more interconnected than ever. Our data is available for almost anyone to sift through due to



References: 1. Center, Finjan Malicious Code Research. "Web Security Trends Report." Securing your web (1996-2008): 1-20. 2. eSecurity Planet. 2011. 16 January 2011 <http://www.esecurityplanet.com/trends/article.php/3871456/Cyber-Crooks-Doubled-Their-Take-in-09-FBI.htm>. 4. Justice, Bureau of Justice Assistance U.S. Department of. "Internet Crime Complaint Center." 2009 Internet Crime Report (2008): 1-26. 5. Phil Williams, Cert Coordination Center. "Implications for Business." Organized Crime and Cyber-crime (2002): 1-7. 6. SOPHOS. "SOPHOS." Security Threat Report 2009 (2008): 1-20. 7. Vanlalnunsanga, M. (n.d.). Statistical Report on Cyber Crime. Retrieved 01 29, 2011, from Scribd: http://www.scribd.com/doc/19720457/Statistical-Report-of-Cyber-Crime 8 9. Wall, David S. "Policing Cybercrimes: Situating the Public Police in Networks of Security within Cyberspace." Police Practice & Research 8.2 (2007): 183-205. Academic Search Premier. EBSCO. Web. 25 Jan. 2011. 10. "TREND MICRO 2011 THREAT PREDICTIONS." Computer Security Update 12.1 (2011): 1-3. Academic Search Premier. EBSCO. Web. 14 Jan. 2011. 11. Wall, David S. "Catching Cybercriminals: Policing the Internet." International Review of Law, Computers & Technology 12.2 (1998): 201-218. Academic Search Premier. EBSCO. Web. 19 Jan. 2011. 14. Stephens, Gene. "CYBERCRIME IN THE YEAR 2005." Futurist July 2008: 32+. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 15. Wall, David S. "Cybercrime, media and insecurity: The shaping of public perceptions of cybercrime." International Review of Law, Computers & Technology 22.1/2 (2008): 45-63. Academic Search Premier. EBSCO. Web. 18 Jan. 2011. 16. Hansen, Brian, and Adriel Bettelheim. "Cybercrime: Congress Addresses the Breach In Online Security." CQ Weekly 60.26 (2002): 1761. Academic Search Premier. EBSCO. Web. 15 Jan. 2011. 17. Gomolski, Barb. "Mr. President, cybercrime is much more than just a pesky computer virus." InfoWorld 23.13 (2001): 98. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 18. Hunton, Paul. "The growing phenomenon of crime and the internet: A cybercrime execution and analysis model." Computer Law & Security Review 25.6 (2009): 528-535. Academic Search Premier. EBSCO. Web. 22 Jan. 2011. 19. National White Collar Crime Center. "IC3 2008 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2008_IC3Report.pdf 20 21. National White Collar Crime Center. "IC3 2006 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2006_IC3Report.pdf 22 23. National White Collar Crime Center. "IC3 2004 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd: http://www.ic3.gov/media/annualreport/2004_IC3Report.pdf 24 25. National White Collar Crime Center. "IC3 2003 Internet Fraud Report." Retrieved 01 29, 2011, from Scribd:http://www.ic3.gov/media/annualreport/2003_IC3Report.pdf 26 27. Bureau of Justice Statistics. Retrieved 02 04, 2011, from BJS:http://bjs.ojp.usdoj.gov/index.cfm?ty=tp&tid=41 28 29. Richardson, R. 2003 CSI/FBI Computer Crime and Security Survey. Computer Security Institute, 2003. 30 31. TextFiles.com. New York Penal Law. http://www.textfiles.com/law/ny_lawsta.law (accessed 15 March 2011). 32 35. Department of Justice. http://www.ncjrs.org/pdffiles1/ojp/186157.pdf (accessed 3 April 2011). 36 http://www.haltabuse.org/resources/laws/index.shtml (accessed 12 March 2011) 37

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

    IS4799 Information Systems and Cybersecurity Capstone Project Unit 2 RFP Bidder’s Conference © ITT Educational Services, Inc. All rights reserved. Learning Objective and Key Concepts…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    paganinip . (2012). Cyberespionage and new opportunities for cybercrime. Available: http://securityaffairs.co/wordpress/3158/cyber-crime/cyberespionage-and-new-opportunities-for-cybercrime.html. Last accessed 29th Oct 2012.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Irwin Margolies

    • 5801 Words
    • 24 Pages

    Torpey, D., Walden, V., & Sherrod, M. (2010, May/June). Breaking the status quo in e-mail review. Fraud Magazine, 24(3), 32-34, 55-56.…

    • 5801 Words
    • 24 Pages
    Powerful Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Medicare Fraud

    • 2440 Words
    • 10 Pages

    FBI — Common Fraud Schemes. (n.d.). FBI — Homepage. Retrieved October 11, 2010, from http://www.fbi.gov/scams-safety/fraud/fraud…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Electronic evidence or digital evidence is any information stored digitally that a party in a court case may use to prove a case in a court trial. This kind of evidence has been in use in the courtrooms for some timeandmay come in the form of instant message history logs, ATM transactions, browser history, databases, and other forms of electronic materials. The reason as to why electronic evidence is gaining momentum in criminal and civil litigation is that there has been a rise in electronic communication users everyday. This all comes down to the impact of revolution within the ICT that generates an effect across all spheres including businesses, transport, and communication. These advancements in electronic communications have revolutionized communication aspects, business aspects, and the relations between friends and family.…

    • 4479 Words
    • 13 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    References: Butterworth, C, & Bresson, P. (2010, March 12). Ic3 2009 annual report on internet crime released. Retrieved from http://www.ic3.gov/media/2010/100312.aspx…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    annotated biography

    • 551 Words
    • 2 Pages

    This article is by the FBI telling how people are accessing your information through the internet and how to protect your information.…

    • 551 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Annonated Bibliography

    • 370 Words
    • 2 Pages

    Identity theft and Identity fraud. (2007) In the U.S. Department of Justice online. Retrieved August 27 2011 from:…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Is Your Information Safe?

    • 1575 Words
    • 7 Pages

    window to get into your house. He doesn't hold a gun to your head, nor does he…

    • 1575 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    CyberCrime Motivation

    • 1610 Words
    • 5 Pages

    Kshetri, N. (2010). The Global Cybercrime Industry: Economic, Institutional and Strategic Perspectives. New York: Springer.…

    • 1610 Words
    • 5 Pages
    Best Essays
  • Good Essays

    Crime Thoeries

    • 704 Words
    • 3 Pages

    Robert W. Taylor, Eric J. Frisch, John Liederbach, and Thomas J. Holt (2011). Digital Crime and…

    • 704 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Working with the Federal government I see daily the precautions taken to ensure that one’s identity is protected. This protection should be grant to the everyday people, as we are the ones at risk. Technology, strictly enforcing the laws against identity theft, and the purchase of a monitoring service…

    • 1645 Words
    • 7 Pages
    Powerful Essays

Related Topics