Abstracts
Cybercrime falls into three categories: (1) a computer is the target of criminal activity; (2) the
computer is the tool used or is integral to the commission of the crime; and (3) the computer is
only an incidental aspect of the crime. Cybercrime is a relatively new phenomenon. Services such
as telecommunications, banking and finance, transportation, electrical energy, water supply,
emergency services, and government operations rely completely on computers for control,
management, and interaction among themselves. Cybercrime would be impossible without the
Internet. Most American businesses maintain WWW sites and over half of them conduct
electronic commerce on the Internet. The rise in popularity of the Internet for both private
persons and businesses has resulted in a corresponding rise in the number of Internet-related
crimes.
Cybercrime an Introduction:
cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on
other computers or posting confidential business information on the Internet.
Defination of cybercrime
computers or posting confidential business information on the Internet.
Perhaps the most prominent form of cybercrime is identity theft, in which
criminals use the Internet to steal personal information from other users.
Two of the most common ways this is done is
through phishing and pharming. Both of these methods lure users to fake
websites (that appear to be legitimate), where they are asked to enter
personal information. This includes Cybercrime is criminal activity done
using computers and the Internet. This includes anything from
downloading illegal music files to stealing millions of dollars from online
bank accounts. Cybercrime also includes non-monetary offenses, such as
creating and distributing viruses on other login information, such as
usernames and passwords, phone numbers, addresses, credit card
numbers, bank account numbers, and other information criminals can use
to "steal" another person's identity. For this reason, it is smart to always
check the URL or Web address of a site to make sure it is legitimate
before entering your personal information.
Because cybercrime covers such a broad scope of criminal activity, the
examples above are only a few of the thousands of crimes that are
considered cybercrimes. While computers and the Internet have made our
lives easier in many ways, it is unfortunate that people also use these
technologies to take advantage of others. Therefore, it is smart to protect yourself
by using antivirus and spyware blocking software and being careful where you enter your
personal information.
problem (with literature review) cybercrime:
Cause of cyber Crime:
cybercrime is criminal activity done using computers and the Internet
Humans tend to engage in criminal enterprises when the rate of return on investment is high and the risk
of loss is low. This calculation is made every day on the part of cybercriminals, and they have concluded it
is profitable to continue committing fraud, stealing financial information and hacking into networks
worldwide.
Effects of Cyber Crime:
cyber crime affects more than the financial integrity of a business. There are many very real and damaging
consequences associated with Internet crime. Understanding the effects of cyber crime is an important
first step in comprehending the necessity of security measures on a computer network.
Types:
Cyber crime--also known as computer crime, e-crime and electronic crime-- is defined as a
criminal act where a computer or computer network serves as the location, means, target or as
the source of the activity. Types range from outside parties who hack into a computer network to
phishing programs which give users a false sense of security, prompting them to divulge
sensitive information.
Loss Of Revenue:
One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an
outside party who obtains sensitive financial information, using it to withdraw funds from an organization.
It can also occur when a business's e-commerce site becomes compromised--while inoperable, valuable
income is lost when consumers are unable to use the site.
Wasted Time:
Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must
devote great portions of their day handling such incidences. Rather than working on productive measures
for an organization, many IT staff members spend a large percentage of their time handling security
breaches and other problems associated with cyber crime.
Damaged Reputations:
In cases where customer records are compromised by a security breach associated with
cyber crime, a company's reputation can take a major hit. Customers whose credit cards or
other financial data become intercepted by hackers or other infiltrators lose confidence in an
organization and often begin taking their business elsewhere.
Reduced Productivity:
Due to the measures that many companies must implement to counteract cyber crime, there is often a
negative effect on employees' productivity. This is because, due to security measures, employees must
enter more passwords and perform other time-consuming acts in order to do their jobs. Every second
wasted performing these tasks is a second not spent working in a productive manner.
Conclusion:
• A range of inherent problems have been discussed with
regards to online security.
• Identification of high risk incoming connections can decrease
fraudulent transactions occurring.
• Adding context to the authentication process can lead to
increased security for online applications.
• Integration of location and personal devices to ensure a person
is who they say they are provides a unique contribution to online
security.