Sign In
Not register? Register Now!
You are here: HomeResearch PaperLiterature & Language
Pages:
3 pages/≈1650 words
Sources:
4 Sources
Level:
APA
Subject:
Literature & Language
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:

Research and Describe How to Control Cybercrime (Research Paper Sample)

Instructions:

it was about cyber crime

source..
Content:

How to Control Cybercrime
Student's name
Institution Affiliation
Some of the cybercrimes include;
Fraud and financial crimes
A presentation through the computer that is dishonest in a nature that leads to individuals making losses may be termed as financial crime. On the other hand, the process of obtaining something that is going to be beneficial to you without being authorized can be said to be a fraud. For an individual to acquire this, he has to have expertise that is going to arable him to perform this theft. If he/she is an employee of an organization, then he has to enter false data or data that is unauthorized or instructions that are unauthorized to make this unauthorized transaction a success. The detection of any changes in the data stored is a very difficult task that will require keen look into the system and the deleting or alteration of the data may go unnoticed. The computer systems may be used to facilitate other forms of fraud like; identity theft, theft of information that is classified, carding, extortion and also bank fraud (Susan, 2010). The consumer and businesses may be targeted by internet scammers using phishing and social engineering.
Cyber terrorism
Since the 2001 there has been an increase in problems in the use of internet and also server scammers. The government officials have indicated that this increase has been in the rise due to the frequency of internet use and also the advancement of technology to reach all the individuals. There has been concerns in the various governments of the growing intrusions that form part of the organized efforts that are meant to assist cyberterrorism, to enable get foreign intelligence, and also terrorist groups being able to know the weaknesses that exist through the security systems of various countries (Susan, 2010). Cyberterrorists are people who tend to coerce or intimidate governments or any formal organizations so as to advance their political interests and other social objectives through the use of computer systems in the attack against others where information has been stored and cause alteration of the systems. In the general sense, cyberterrorism is said to be terrorism acts that are performed through the use of the cyberspace or also the use of just the computer. Rumors that may be spread through the internet that are meant to scare the public on a likely occurrence of cybercrime are going to be considered as cyberterrorism. Also, hacking activities that are meant to destroy the life of individuals, causing fear, that are meant to demonstrate power, also those with the intention of collecting information that may be intended to cause fear amongst people's lives , blackmail and robberies, may be considered to be cyberterrorism.
Diffusion of cybercrime
Cybercriminal activities that are in broad diffusion in nature can be as simple as an issue of prosecution of the detection of computer crimes. According to some researches that have been done on this, having the technical expertise and also, the accessibility of all these, does not par any individual from getting into commitment of cybercrime. With the development of technology, hacking has become much less complex that it was some years back (Susan, 2010). This is because, most people who have been previously hacking various information, this is due to their diffused knowledge in the internet. There has been an increase in the issue of information sharing where those who are beginners in hacking have got help from those who have done it for long.
Cyber extortion
Cyber extortion is said to occur when a computer system, a website, or an e-mail are exposed to a threat of denial of access to services or the attack by the malicious people. When the hackers have had a success of causing altering of the services, they are able to demand lamp sum of money so as to stop their acts and offer protection in return. According to investigations that have been done by various governments, the attacks by cyber extortionists have been in increase on the networks and also corporate websites which causes inability in their operation and also the demanded payments ate a point may become difficult to raise(Susan, 2010) . This has been a challenge to many hence taken as a serious cybercrime that needs control.
Ways on how to control this terror
Investigation
To ensure that this habits of cybercrimes are put on hold, then it is necessary that players in the various industries are enabled to investigate their computer they can detect cases of malicious activities. A computer can contain more data that can be used as evidence in the investigation of various criminal activities though it has never been used for the purpose of criminal activities. This can assist in the capping of various criminal acts through the computer. Most countries have put measures where there are predetermined activities nature to enable them determine the real intentions of each and every user (Susan, 2010).
Legislation
The reason as to why cybercrimes has not yet been controlled though is due to the fact that the laws that have been put in place that are easily exploited making those that have performed the crimes to be caught free. There are poor systems that are meant to enforce laws and prosecute calibrates. Due to these weak laws we have seen continued increase of cybercrimes. However if the trend is going to be maintained, the cases are going to escalate and cause more harm to people. The put of laws that are strict to ensure that the cybercrimes are controlled is the only way that we are going to ensure that the cases are contained and no harm is caused on those who use the internet and computer systems (Susan, 2010).
Penalties
Penalties for computer related cr...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Long-Term Strategies for Management of Personnel
    Description: Long-Term Strategies for Management of Personnel Literature and Language Research Paper...
    8 pages/≈2200 words| 3 Sources | APA | Literature & Language | Research Paper |
  • What is a Data Warehouse?
    Description: A data warehouse is a database designed to enable business intelligence activities: it exists to help users understand and enhance their organization's performance.Data warehouses separate analysis workload from transaction workload and enable an organization to consolidate data from several sources. ...
    1 page/≈550 words| 2 Sources | APA | Literature & Language | Research Paper |
  • Security And The Goods And Services Tax Research Assignment
    Description: The Goods and Services Tax will replace a confusing jumble of central and state levies to create a common market across India for the first time....
    1 page/≈550 words| 1 Source | APA | Literature & Language | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!