Wednesday, March 13, 2019
Cyber Crime in the 21st century Essay
escort the key features around the growth, development and policing of cyber plague in the 21st century.The net profit was first created in the 1960s, tho it only really started to take eat up and develop in the last 20 years with big websites such as Google (1998) and YouTube (2005). With the mesh developing and people knowing more than approximately it, cyber abuse then came ab break and since then it has grown and gotten more dangerous and more extreme.thither atomic number 18 several different signs of cybercrime for font one is called cyber violence, this includes straw and harassment, it can also be bullying people online via social networking sites and claver rooms. Cyber obscenity is another type of cyber crime which is sexual including porn sites. Cyber transcend is the crime of hacking sites and cyber theft is also another cybercrime which is credit bill sticker mockery as well as the illegal downloading of movies, music, books etc.Computer hackers atomic number 18 very intelligent, initially they started hacking sites simply because they were able to, and they wanted to explore the sites, at the start it was done just for fun. However it didnt take foresightful for these hackers to realise their potential and w eyelid they could actually be doing, soon it then escalated and they became more educated and more confident in hacking. These hackers could now be set forth as fill outers.There ar a few types of attacks that can be made on a computer. One is Denial of Service (DoS) attacks. This is a system set up which sends out a fake email to an individual, it could be to check their password for online banking or f atomic number 18 credit card payments etc. It will look very genuine to service users and a lot numerous of them fall into the trap. E-Mail bomb is another type of attack that can be made, hundreds of emails are sent to a service in order to shut it down. Another attack is a Trojan Horse, these are attachments sen t to people perhaps through email, they whitethorn also start up on the screen. They are very appealing to individuals for example gabble here for your free iPad or you are the 999,999th visitor, click here to consider your free prize these are likely to open up viruses. early(a) types of attacks include Worms, Network Scanning and Key Loggers. Argot is a type of language used for hacking sites and known by all highly consummate hackers.There are three different types of hackers they are Black hat hacker, white hat hacker and grey hat hacker.1. Black hat hacker they are dangerous and highly skilled hackers. They will make it known to people how good they are at hacking and how dangerous they are.2. clean hat hacker they are usually employed by companies to interrogatory the security of their websites.3. Grey hat hacker they are very unorthodox and because of this it makes them the close to dangerous of all three hackers.Many big website pass been hacked such as Yahoo an d Play, this is not well known because companies mingled do not want the news to be publicised mostly because it would not be good for business as people may think that the website is not safe and will not use it. 22% of the top mobile applications rescue been hacked.Stalking only became a crime in 1997 and a criminal offence in England and Wales in 2012. Cyber husk activities include sending repeated, unwanted messages, it could be ordering stuff on behalf of the victims, publicising the victims personal information, spreading false information about the individual and load-bearing(a) others to harass the victim. There are 2 types of chaff, direct and indirect. Direct is most common and often starts with an email. Indirect is chaff with the use of billboards and advertisements. In 1999, Ellison carried out research on Working to the Halt of Abuse Online 2000 and found that 39% of stalkers began contact with the victim via email.Only 1% of stalkers didnt use the internet to f irst see in contact with the victim. Stalkers are likely to be an ex- checkmate, however half of all stalkers arent known by the victim. There were websites set up for people to stalk there ex partner online, they were called Avengers Den and Get Revenge On Your Ex they were designed so people could crush their ex-partners self esteem and they could fake SMS them. 87% of cyber stalking victims are young women (Working to the Halt of Abuse Online). Only 50% of cyber stalking activities are reported to the authorities.There are three groups of cyber stalkers Simple Obsessional, these stalkers pass been in a relationship with the victim, the victim has tried to call it of but the stalker refuses to accept it and becomes obsessed with the victim. Love Obsessional, these are stalkers who handnt had a relationship with the victim but they believe that themselves and the victim have a special connection. Erotomaniac stalkers believe that the victim is deeply in hunch forward with them, it can be messages through the media that lead them to believe this. (Melroy, 1996 Mullen et al., 1999)Cybercrime violence has colligate with terrorism. Cyber terrorism is when an attack is made against a person or property. Cyber terrorism can even be causing a person to be fearful of being harmed. Al pedestal which is an international terrorist organisation which began in the late 1980s has been on the internet from the late 1990s. These Al Qaeda sites may only be on the web for a result of hours before they are shut down, however they are soon replaced by another one. There were an estimated 5,600 sites as of January 2008 and 900 appearing each year (Weimann 2008).Policing Cyber law-breakingCybercrime has no limits and it can be uncontrollable, there are so many crimes committed online it is hard to keep track of all them. Also it is uncontrollable to see a pattern in cybercrimes.Cybercrime is still developing, there are more viruses every day, it is the fastest moving type of crime. This may be because many people may be committing cyber crime without knowing it, for example people may not know when they are downloading music illegally. Cyber crime is growing and growing. The internets characteristics make cybercrime policing very hard, especially hackers, they are so skilled and make sure they do not get caught. There are state funded public police organisations set up to help police cybercrime and put a go against to it. There are also state funded non police and non public policing organisations. ISPs are set up as well as internet users forming groups to protect themselves from cybercrime.There are specialist units in place for policing cybercrime for example Europol which is the European law enforcement office and Interpol which is the worlds largest policing agency with 109 countries involved. They connect policing communities to make the world safer. rhetorical Investigation Units, CID/ Fraud Squad, Computer crime units and child protection units are specialist units that deal with cyber crime. The aim for the future is to bring in virtually form of legislation that cuts down on cyber crime and also to stop cyber crime from starting in the first place.To conclude the internet has proven to be very dangerous and cyber crime is developing rapidly. People have to be extremely careful while using the internet and not fall into the hackers trap.Warren, P and Streeter, M (2005). Cyber Crime. London Vision Paperbacks. 1-19, 19-45, 45-72.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment