Surname 2
Briana Castillo
Cyber Crime
6-16-15
CYBER CRIME RESEARCH
A cybercrime is any illegal behavior that is conducted by use of electronic operations that aim to destroy security of other computer systems and the data processed in them (Zhang, 14). Computer is the commonly use electronic garget to commit majority of cybercrimes. One of the cybercrimes that have been frequently committed in the last three months using the computer is hacking.
Hacking is a cybercrime where a person’s, organization or government computer system is broken into with the aim of getting private or sensitive information. In United States, cases of computer systems being hacked are very common and this has made hacking to be classified as a felony and an act punishable by law (TIWARI, 16). This cybercrime is committed by the criminals having a variety of software that help them access other people’s computer system without being noticed.
Hacking has been a crime frequently reported with some individuals and organization experiencing huge financial loss or tarnishing their public name. This is because hacking makes criminals access sensitive information such as trade secret, source code, customer and employee information, credit card information among other private and sensitive documents (Zhang, 14). This crime causes theft of identity and causes security breaches. Hacking has also been commonly used as a competitive advantage where a criminal can break in to an organization customer data files and later selling it to competitors or else, using the private and proprietary information to compete with that organizations.
A good example of hacking is an incidence that occurred in south California in the department of revenue in 2012. Some criminals hacked the department computer system and stole 3.6 million numbers of social security plus 387,000 credit and debit numbers (Zhang, 24). An investigation conducted by U.S secret service showed that the hackers had been accessing the department computer system from august but were unnoticed until this act was conducted.
Hacking has become more common in the last three month. In April 2015, U.S investigators noticed that records of four million workers were stolen and they suspected that the hacking was sponsored by Chinese government. Another recent case on hacking is the one of cost target companies which had caused theft of over $300 million (TIWARI, 19). Some of the companies that were affected by this act were Carrefour SA, NASDAQ and visa Inc. among others. This was an act of five hackers who were caught and prosecuted as they were charged with the biggest cybercrime is United States. In addition, computers have been used to hack government websites like the tax authority resulting to high number of frauds. Banks have also been hacked and millions of dollars stolen.
In conclusion, hacking is one of the most reported cybercrime. In fact, 30,000 websites are hacked every day. Preventive measures should t ...
1. Surname 2
Briana Castillo
Cyber Crime
6-16-15
CYBER CRIME RESEARCH
A cybercrime is any illegal behavior that is conducted by use of
electronic operations that aim to destroy security of other
computer systems and the data processed in them (Zhang, 14).
Computer is the commonly use electronic garget to commit
majority of cybercrimes. One of the cybercrimes that have been
frequently committed in the last three months using the
computer is hacking.
Hacking is a cybercrime where a person’s, organization or
government computer system is broken into with the aim of
getting private or sensitive information. In United States, cases
of computer systems being hacked are very common and this
has made hacking to be classified as a felony and an act
punishable by law (TIWARI, 16). This cybercrime is committed
by the criminals having a variety of software that help them
2. access other people’s computer system without being noticed.
Hacking has been a crime frequently reported with some
individuals and organization experiencing huge financial loss or
tarnishing their public name. This is because hacking makes
criminals access sensitive information such as trade secret,
source code, customer and employee information, credit card
information among other private and sensitive documents
(Zhang, 14). This crime causes theft of identity and causes
security breaches. Hacking has also been commonly used as a
competitive advantage where a criminal can break in to an
organization customer data files and later selling it to
competitors or else, using the private and proprietary
information to compete with that organizations.
A good example of hacking is an incidence that occurred in
south California in the department of revenue in 2012. Some
criminals hacked the department computer system and stole 3.6
million numbers of social security plus 387,000 credit and debit
numbers (Zhang, 24). An investigation conducted by U.S secret
service showed that the hackers had been accessing the
department computer system from august but were unnoticed
until this act was conducted.
Hacking has become more common in the last three month. In
April 2015, U.S investigators noticed that records of four
million workers were stolen and they suspected that the hacking
was sponsored by Chinese government. Another recent case on
hacking is the one of cost target companies which had caused
theft of over $300 million (TIWARI, 19). Some of the
companies that were affected by this act were Carrefour SA,
NASDAQ and visa Inc. among others. This was an act of five
hackers who were caught and prosecuted as they were charged
with the biggest cybercrime is United States. In addition,
computers have been used to hack government websites like the
tax authority resulting to high number of frauds. Banks have
also been hacked and millions of dollars stolen.
In conclusion, hacking is one of the most reported cybercrime.
In fact, 30,000 websites are hacked every day. Preventive
3. measures should therefore be taken to prevent this act as it can
lead financial loss, damage of public image or other effects
related to exposure of private and confidential information. In
addition, people should be educated on what to do in case
hacking occur.
Works cited
TIWARI, B K. “CYBER CRIMES AND ITS JURISDICTION.”
Indian Streams Research Journal 3.5 (2013): 1-5.
Zhang, Y et al. “A survey of cybercrimes.” Security and
Communication Networks 2012: 422-437. Print.
http://www.aicpa.org/interestareas/forensicandvaluation/resourc
es/electronicdataanalysis/downloadabledocuments/top-5-
cybercrimes.pdf
http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web-
sites-hacked-a-day-how-do-you-host-yours/
http://www.medianama.com/2012/03/223-112-government-
websites-hacked-in-last-6-months-1798-internet-fraud-cases/
Protecting the Mobile Innovation Idea
Name
Name of institution
Date
4. Protecting the Mobile Innovation Idea
Patenting and licensing the mobile innovation technology
developed for UNICEF is essential for protecting the system.
This will give me, as well as UNICEF, the rights to exclude
other people from using, copying, or selling the invention
without my permission, (Lee, 2012). It is an unethical conduct
to use intellectual property without prior permission or
acknowledgment from the original author, (Lee, 2012). As such,
patenting will commit the Mobile Innovation Technology to the
law and will prevent misuse or abuse of the technology by
others.
List of references
Lee, K. L. (13 September, 2012). Role of Software Patenting
and Licensing in Software
Protection. Retrieved on 4 July 2015 from:
http://www.nber.org/papers/w16323
Running Head: METHODS TO STOP CYBER CRIMINALS
1
METHODS TO STOP CYBER CRIMINALS 3
Methods to stop cyber criminals
Grantham University
Briana Castillo Valdes
5. The internet has provided numerous opportunities for
individuals to access information for all over across the world.
However, despite these many opportunities that the internet has
provided, cyber-crime has also come along as many people have
exploited the internet opportunities with the wrong intention of
causing harm to other internet users. Though there is a huge
problem that cyber-crime poses to advancements in technology,
there are as well many methods that can be adopted to stop
cyber criminals (Acq DeAngelis, & Sarat, 2000).
Education is one of the most effective methods to stop
cyber criminals. Knowledge is power and the kind of
information an individual has can be a tool to use against any
form of attack whether psychical or technological. Any cyber
criminals are normally very knowledgeable about the internet
and computers. They possess a wide range of information that
helps them in carrying out their criminal activities. Learning
and education on the various scams that exist on the internet
and the various ways to avoid them will help internet users in
stopping the cyber criminals as the information will keep the
users more knowledgeable than the cyber criminals.
The use of a firewall is also a method that can be used to
stop cyber criminals. A firewall is very important defense that
works by keeping out cyber criminals from accessing any
information in your computer.
The use of antivirus may help in stopping of cyber
criminals. When a computer user has installed an antivirus in
his or her computer, it protects the computer from getting
infected by viruses. In order to get the best out of the antivirus,
it is important to ensure that it is always updated.
Use of encryption to secure computers and any other
6. technological devices is also an effective method that can be
used to stop cyber-crimes. Encryption helps the protection of
sensitive data that has been stored in a computer. In encryption,
the selection of a password matters as the passwords that an
individual chooses to use should not be easily guessed. Making
the passwords as complex as possible plays a very key role in
securing the computer from hackers. The passwords need to be
frequently changed in order to avoid damage that may be caused
by people who may have accessed the passwords (Acq
DeAngelis, & Sarat, 2000).
Acquiring computer updates as soon as they are available is an
effective way that can stop computer criminals from attacking
your computers. In order to acquire updates, one can apply for
patches and any other software updates as soon as they are
available. Keeping the computer updated makes it difficult for
cyber criminals by blocking them from attacking your system.
Practicing safe online services will help stop cyber
criminals in a number of ways. To begin with, while surfing the
internet it is possible to find yourself in phony websites that
may entice you to supply them with personal information that
create an avenue for an attack. While engaging in online
shopping, it is also possible to visit websites that subject you to
cyber-crimes. In order to avoid attacks through online services
such as surfing and shopping it is important to be keen on what
websites you visit (Quarantiello, 1996).
References
DeAngelis, G., & Sarat, A. (2000). Cyber-crimes. Philadelphia,
PA: Chelsea House Publishers.
Quarantiello, L. E. (1996). Cyber-crime: How to protect
yourself from computer criminals. Lake Geneva, WI: Limelight