0% found this document useful (0 votes)
80 views4 pages

Abstracts: Phishing Pharming

Cybercrime falls into three main categories: crimes where a computer is the target, crimes where a computer is used as a tool, and crimes where a computer is incidentally involved. Cybercrime relies on computers and the internet, and has increased as both private and commercial use of the internet has grown. Some common forms of cybercrime include identity theft through phishing and pharming scams, and distributing viruses. Protecting personal information and using security software can help prevent becoming a victim of cybercrime.

Uploaded by

Waqas Ahmad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views4 pages

Abstracts: Phishing Pharming

Cybercrime falls into three main categories: crimes where a computer is the target, crimes where a computer is used as a tool, and crimes where a computer is incidentally involved. Cybercrime relies on computers and the internet, and has increased as both private and commercial use of the internet has grown. Some common forms of cybercrime include identity theft through phishing and pharming scams, and distributing viruses. Protecting personal information and using security software can help prevent becoming a victim of cybercrime.

Uploaded by

Waqas Ahmad
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Abstracts

Cybercrime falls into three categories: (1) a computer is the target of criminal activity; (2) the
computer is the tool used or is integral to the commission of the crime; and (3) the computer is
only an incidental aspect of the crime. Cybercrime is a relatively new phenomenon. Services such
as telecommunications, banking and finance, transportation, electrical energy, water supply,
emergency services, and government operations rely completely on computers for control,
management, and interaction among themselves. Cybercrime would be impossible without the
Internet. Most American businesses maintain WWW sites and over half of them conduct
electronic commerce on the Internet. The rise in popularity of the Internet for both private
persons and businesses has resulted in a corresponding rise in the number of Internet-related
crimes. 

Cybercrime an Introduction:

cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on
other computers or posting confidential business information on the Internet. 

Defination of cybercrime

computers or posting confidential business information on the Internet.

Perhaps the most prominent form of cybercrime is identity theft, in which


criminals use the Internet to steal personal information from other users.
Two of the most common ways this is done is
through phishing and pharming. Both of these methods lure users to fake
websites (that appear to be legitimate), where they are asked to enter
personal information. This includes Cybercrime is criminal activity done
using computers and the Internet. This includes anything from
downloading illegal music files to stealing millions of dollars from online
bank accounts. Cybercrime also includes non-monetary offenses, such as
creating and distributing viruses on other login information, such as
usernames and passwords, phone numbers, addresses, credit card
numbers, bank account numbers, and other information criminals can use
to "steal" another person's identity. For this reason, it is smart to always
check the URL or Web address of a site to make sure it is legitimate
before entering your personal information.
Because cybercrime covers such a broad scope of criminal activity, the
examples above are only a few of the thousands of crimes that are
considered cybercrimes. While computers and the Internet have made our
lives easier in many ways, it is unfortunate that people also use these
technologies to take advantage of others. Therefore, it is smart to protect yourself
by using antivirus and spyware blocking software and being careful where you enter your
personal information.

problem (with literature review) cybercrime:

Cause of cyber Crime:


cybercrime is criminal activity done using computers and the Internet
Humans tend to engage in criminal enterprises when the rate of return on investment is high and the risk
of loss is low. This calculation is made every day on the part of cybercriminals, and they have concluded it
is profitable to continue committing fraud, stealing financial information and hacking into networks
worldwide.

Effects of Cyber Crime:


cyber crime affects more than the financial integrity of a business. There are many very real and damaging
consequences associated with Internet crime. Understanding the effects of cyber crime is an important
first step in comprehending the necessity of security measures on a computer network.

Types:
Cyber crime--also known as computer crime, e-crime and electronic crime-- is defined as a
criminal act where a computer or computer network serves as the location, means, target or as
the source of the activity. Types range from outside parties who hack into a computer network to
phishing programs which give users a false sense of security, prompting them to divulge
sensitive information.

Loss Of Revenue:

One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an
outside party who obtains sensitive financial information, using it to withdraw funds from an organization.
It can also occur when a business's e-commerce site becomes compromised--while inoperable, valuable
income is lost when consumers are unable to use the site.

Wasted Time:
Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must
devote great portions of their day handling such incidences. Rather than working on productive measures
for an organization, many IT staff members spend a large percentage of their time handling security
breaches and other problems associated with cyber crime.
Damaged Reputations:
In cases where customer records are compromised by a security breach associated with
cyber crime, a company's reputation can take a major hit. Customers whose credit cards or
other financial data become intercepted by hackers or other infiltrators lose confidence in an
organization and often begin taking their business elsewhere.
Reduced Productivity:
Due to the measures that many companies must implement to counteract cyber crime, there is often a
negative effect on employees' productivity. This is because, due to security measures, employees must
enter more passwords and perform other time-consuming acts in order to do their jobs. Every second
wasted performing these tasks is a second not spent working in a productive manner.

Conclusion:

• A range of inherent problems have been discussed with


regards to online security.

• Identification of high risk incoming connections can decrease


fraudulent transactions occurring.

• Adding context to the authentication process can lead to


increased security for online applications.

• Integration of location and personal devices to ensure a person


is who they say they are provides a unique contribution to online
security.

You might also like