Cybercrime and Cyber Criminals

Published: 2021-08-14 12:25:06
essay essay

Category: Law

Type of paper: Essay

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Hey! We can write a custom essay for you.

All possible types of assignments. Written by academics

GET MY ESSAY

Cybercrime is a crime that involves a computer. It is defined as Offences that are committed against individual or groups of indiduals with criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, loss to the victim directly or indirectly using internet. It affects person, financial health and nation’s security. Some of the popular IT crimes are data breaching, hacking, sextortion, child pornography, child grooming, copyright infringement etc. Private & confendital informs are intercepted and dsiclosed illegally.
Who are Cyber Criminals? (Hemraj Saini, 2012)
a. Cyber Terrorists: Hackers and data breachers who break websites and other critical data.
b. Crackers: Computer virus creaters and distributors fall under this category.
c. Cyber Bulls: Cicious forum posts, posting fake profiles on web, emails messaging
d. Pranksters: They perpetrate tricks on others. They are not intened for long lasting harms.
e. Career Criminals: They do crime to make money as their income. (Hemraj Saini, 2012)
What are the Categories of Cyber Crime?
1. Data Crime:
Data Interception: Influence data by Data monitoring and information gathering.
Data Modification: Attack the network to modify the data and send the target.
Data theft: Illegal copying of business or individual data. It includes passwords, ssn, credit card info and other PII information or confidential informations of the business.
b. Network Crime: Interfering functioning of computer network by inserting, deleting, tramsmitting, damaging or alterning networking data, Network Sabotage etc.
c. Access Crime: This includes unauthorized access, virus Dissemination (virus, worms, Trojan horse, logic bomb etc). (Hemraj Saini, 2012)
Impact of Cyber Crime:

Economic Impact: Financial impact to the company due to breach in PII information which loses customers confidence. Fall in stock market and other serious economic circumstances.
Ransomware Attack: Restricts user from accessing computer systems by freezing computer screen or encrypting computers.
Social Media Deception: This includes accessing social media accounts by illegal means and post deceptive messages and posts.
E-Banking Fraud: Hackers sends some attachments to the e-banking users which contains malicious programs. Opening these kinds of files infect the computers.
Email Scam: Cyber criminals will hack the email login details and cheat victims with all possible means to make remittances.
Online Business Fraud: sellers and buyers fail to receive the payment or goods after payment are made. Hackers hacks the transactions.
Identity Theft: Hackers may find the PII Information of the individuals and misuse data to get the benefits. (Hemraj Saini, 2012)

Future Trends:

Hacking in the critical systems in government companies and financial instutitions can lead to leading data loss, misuse and killing of critical systems.
Increase money laundering through over-invoicing and under invoicing in e-commerce.
Disclosure of confidential informations from social media during group chat. (Hemraj Saini, 2012)

Solution to the Cyber Crimes:

Antivirus and Anti Spyware Software
Firewalls & Cryptography
Cyber Ethics and Cyber Laws (Hemraj Saini, 2012)

References:

Bisson, D. (2018). The 10 Biggest Data Breaches of 2018… So Far. Retrieved from https://blog.barkly.com/biggest-data-breaches-2018-so-far Cybercrime. (n.d.). Retrieved from wikipedia: https://en.wikipedia.org/wiki/Cybercrime
Hemraj Saini, Y. S. (2012). Cyber-Crimes and their Impacts: A Review. Retrieved from https://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf

Warning! This essay is not original. Get 100% unique essay within 45 seconds!

GET UNIQUE ESSAY

We can write your paper just for 11.99$

i want to copy...

This essay has been submitted by a student and contain not unique content

People also read