Analysis On Computer And Cyber Crime

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

WARNING: This Essay Has No Title!

ANALYSIS ON COMPUTER AND CYBER CRIME

Cyber Crime Science is a rising zone of study pointing to avoid cyber crime by joining together security insurance methods from Information Security with experimental utilized as a part of Crime Science. Qualified information Security research has advanced strategies for ensuring the confidentiality, uprightness, and acceptability of information holdings yet is less solid on the experimental investigation of the activeness of the mentioned methods .Qualified information and Communications Technologies (Icts), specifically the Internet, have been a more and more important part of worldwide social, political and financial life for two decades, and are the backbone of the worldwide informative content public order today. Their advancement and growth has carried numerous profits and yet the danger of genuine digital strike showed in the course of recent years through acts of digital surveillance and cyber crime inside the virtual, organized environment that we live in. In this setting, the European Union in the course of recent years has been improving its arrangements towards digital threats, in spite of the fact that this has frequently been very divided and chaotic now and again. Using the notion of security as versatility this paper furnishes a hypothetically advised comprehension and discriminating appraisal of the advancement of the administration framework for digital security, through tending to this centre most exploration inquiries.

CONTENTS:

PAGE NO

1. INTRODUCTION 4

1.1 BACKGROUND 4

1.2 ETHICAL ISSUES ANS RISKS 4

1.3 PURPOSE OF THE PROJECT 4

2. LITERATURE REVIEW 5

3. RESEARCH 7

3.1 SOLUTIONS TO CYBER CRIME 9

4. CONCLUSION 10

5. REFERENCES 11

LIST OF FIGURES:

FIGURE 1: Shows the usage of computer 6

FIGURE 2: Motives of cyber crime Offenders 9

LIST OF TABLES:

TABLE 1: Safe/ Unsafe use of Computers 10

1. INTRODUCTION

1.1 Background

The society, Industries and government are completely depending on IT for serious concerns and software faults and the serious impacts of "Cyber- crimes" caused by Hackers. Such digital criminal acts can't be recognized independently for unique frameworks, due to the quickly developing interconnectivity between IT frameworks, by means of Internets, and also by direct physical interconnection, or replaceable media for example diskettes. Such interconnectivity divides IT frameworks into segments of what is in large framework that may endure a failure, or whose information or programming may be genuinely dirtied thus of a specific act. Undoubtedly, with the development of electronic supports exchange, without a moment to spare practically any organisation's or company’s IT Infrastructure is in threat of ending up being a not well defined part of a not well described global framework, whose setup and operation are not under any control.

Some of the IT systems are so important to the organizations that they employ software and hardware redundancy to ensure the use of encryption, system availability, and to maintain confidentiality and information integrity which are carefully operated and managed through disaster recovery plans when situation fails. However software faults, operational errors and accidental hardware are the main concerns.

1.2 Ethical Issues and Risks

Ethics are a set of rules designed to determine moral standards which is also known as socially acceptable behaviour. Nowadays many users are questioning the activity involved in information technology as to what is and what is not ethical. Computer crime, protection of personal data and cracking are serious issues as it involves violation of people's privacy, their privileges would be invaded and the authenticity of data is questioned. The juridical and technical issues that rise in the struggle against cybercrime are huge. It gets so hectic that sometimes the governments and authorities feel tempted to consider other directives that could generally endanger the human rights and individual liberties. This could be very harmful and should not be underestimated.

Cyber-crime may have major consequences on the country's economy. Cyber criminals could cause extensive losses to organizations and individuals. Therefore preventive measures should be taken to prevent cybercrime. "Prevention is always better than cure". People should know what they are doing with their computers. They should not be downloading or using peer to peer software or illicit material. The reason is their computer might get hacked or might get a virus. The data could be at risk if it is stored in a computerized format as cyber- crime is so common.

1.3 Purpose of the Report

The purpose of this report is to create awareness of the effects of cyber- crime, to know how the hackers are committing the crime, the security measures to be taken to keep your system safe and protect it from the hackers. Most of the people get a new computer but they are unaware of the security measures to be taken to prevent it from virus attack. Anti-virus software, Operating systems and security applications should be updated regularly to avoid access to a PC by a Hacker.

2. LITERATURE REVIEW

In the recent years the growth of Internet crime is vast and it is targeted as Computer crime and convicted under the Act, the Computer Misuse Act 1990. Almost 70% of the people have PC's at home and Laptops and 93% of this population uses Broadband. Together with the technologically sophisticated and the less well educated people this growth is now raising. Personal computers are open programmable devices that are known for its adaptability and flexibility; however these are the reasons that make internet crime and cyber-crime possible. More material downloaded means more chance for malware to get embedded on the machines. Under dial-up the client shut down their association with the Internet and their machine was safe until the next session. Under broadband there is no expense to the client in keeping the association with the Internet constantly open – keeping in mind this happens, an unprotected machine is open to risk. There are yet different multipliers: more time on the web, more information downloaded, cheap workstations with cheap information space has empowered experimenters and people to start new information concentrated administrations for example media downloads, e-commerce sites, social networking, e-banking and other sites. The government have also started using the internet for collection of tax, delivering government services and providing information services.

Viruses and Trojans are also called as Malware. All the types of workstation misuse are expensive to examine and due to the specialized needed from specialists furthermore the recurrence with which such occasions cross jurisdictional boundaries. The Internet gives various chances to might be cyber stalkers, from visit rooms sending extensive amounts of troubling messages, to posting qualified data on release sheets, to social networking sites, to setting up malicious online sites, to material which indicates to come to the user and causes trouble to them.

Unsolicited Email in bulk is called as Spam. Spam is often said to be over 90% of the Email traffic. More advanced specialized means of "hacking" a site which has been crudely secured, either to see informative data which is supposed to be secured by password access or where commands are utilized which empower a whole "back-end" database to be recovered. A Trojan or "back-door" system could be secretly instated on a target workstation to give a client access by means of the Internet. Otherwise, a key logging device or system might be commissioned on a target Pc, either to catch a password/username combination for later use for securing of private informative content that was being sorted into the machine. A further system includes the misuse of poorly secured remote systems then after that trusting that machines on the system are themselves inadequately secured.

The prevailing component in digital crime is expanded to the Internet. By utilization of Internet, cybercriminals regularly engage codes, pictures, or electronic conveyance to run malicious activities. Some of the important type of internet crime are data fraud, money related robbery, surveillance, copyright encroachment and pornography. Cyber -crimes are of two classes: where a Pc system is attacked by other Pc systems. For example a code or a virus used to deactivate a system. The second type is where a target population is attacked by a computer network. For example fraud, theft and intrusions.

Issues around digital crimes are more complex. Nowadays institutions are keener in putting an end to cyber-crimes that have grown in importance. Developments have been made in the improvement of new malware programming, which can effectively identify criminal conduct. In addition, Anti-virus systems of high quality are provided for free with a purchase of an operating system and a computer in many countries. In order to control technological exploitation identification and technology monitoring of mechanisms were used. There are few myths that scare the users about cyber -crime.

Internet crime takes place everywhere and the internet is not safe for use.

These criminals are never caught.

Your identity can be hacked.

The internet is responsible for the hacking that takes place.

Criminals never get punished.

The way the media reports cyber- crime scares the users who are not familiar about this system. Some of the cyber- crimes have become acceptable to the society because they are widely performed, such as piracy. Most of the people are unaware of the types of cyber -crimes or have limited knowledge on it, but they fear certain crimes that are well known although there is no possibility of them becoming victims to these crimes. This shows that the threat of cyber- crime depends on the mind-set of a person.

Figure 1: Shows the usage of computer (GorazdMesko, Igor Bernik (2011))

From the above figure, we know that most of the users (98.2%) use their computer to access Social Networking sites, to check their emails (97.8) and for browsing the web(96.8%), it could either be at work or at home. More than 50% of the population use the computer for work related purposes and for personal interests. Other facts state that 88% use the computer for editing text and data and 66.4% for p2pfile sharing. Many users freely download and share files on the internet illegally. The younger generation now a days use the internet to read on cyber space instead of reading the traditional way.

3. RESEARCH:

There is presently a complex and independent computerized underground economy in which information is the illegal item. Taken particular and financial information – utilized, for instance, to gain access to credit cards and bank account details, or to falsely secure new lines of credit – has a financial quality. This drives a reach of criminal exercises, that includes pharming, malware distribution, phishing, hacking of company servers, and is backed by a hackers, web hosts and people capable to rent systems of numerous workstations to complete mechanized attacks. With the adoption of internet, broadband infrastructure and mobile internet the rate of cyber- crime continue to increase worldwide therefore increasing the number of potential victims and reaching new heights of vulnerability making it capable to transmit double the data than it used to. Developing countries have accepted these internet technologies increasing the threat and the risks to data protection and security. There are dozens of sub categories to these crimes which have solutions but none of them are completely safe.

Child Pornography

This form of cyber- crime is against the ethics and is growing rapidly. This includes trafficking, distributing, posting obscene material and dissemination. Videos of underage teenagers, obscene photos will be posted by these offenders in this type of crime for free or a fee will be charged for those who register in their websites. The Law and the FBI are working undercover trying to eradicated child pornography.

Viruses

A virus is considered to be one of the major crimes that affect thousands of people every day. These viruses are used to gain access to other people's computers, cause harm to their hard drive and view their personal information. In the recent times the "Melissa Virus" is the most devastating and popular viruses. In order to fight these viruses’ people and companies can purchase a anti-virus software to protect their computer, refrain from opening spam emails, clicking on any suspicious links and downloading anything they do not know.

Cyber Harassment

This type of crime comes in many forms and it can be racial, religious or sexual.Intruding other people’s privacy also involves this crime by using the internet.In order to avoid this crime people should report all such incidents to their local authorities. This type of harassment aims to attack certain group of professionals such as police officers, judges, doctors, teachers and other public figures.

Phishing

In this crime the user is forced to reveal their banking and credit card details that include their username and passwords.In this process the user receives an emailfrom their bank asking them to login in a site that requires their username and passwordwhich looks to be genuine. The website turns out to be fake and it captures all the information and uses it later. Most of the time the phisher does not deletes the victim’s records and does not claim the funds himself. He uses other resources and offers collections to them. The identity of the person who is actually responsible for this crime will be unknownalthough it was committed. The spam emails are deleted quickly and the innocent people become victims to this type of crime.Normally the counter from where the fake websites are operated and the country of the victims are not same.

Most of the time people known to be potential victims would require support and advice in using the internet.

Children should be monitored when they are using the computer.

Small Business with employees less than 50

Adults while working, at home, travelling, mobile internet, and in the internet cafes.

Pensioners, whenever they use the internet.

The study of criminal activities that uses the internet is shown below:

Malware also known as viruses and Trojans.

Fraud includes Phishing and Identity Theft, fake charities, E-commerce sites and misleading financial services.

Adult to adult Harassment

"Cyber- Bullying", which is common between children.

Spam Distribution

Exploitation of underage teenagers for sexual purposes.

Data Theft - confidential information.

Insurance from system proliferated malevolent programming is of small quality if such programming can effortlessly drop into the framework in different ways. Here the movement towards user controlled desktop figuring assets has confused the scenario since those who have viable 'day to day' control over the mentioned assets – that is the close clients – seldom comprehend the details of the framework. Surprisingly, frameworks with complex electronic border controls have experienced seriously infections presented by their particular clients transferring programming onto their machines.

Figure 2: Motives of cyber crime Offenders (GorazdMesko, Igor Bernik (2011))

3.1 SOLUTIONS TO CYBER CRIME:

A number of solutions and techniques have been developed to prevent cyber crimesbut still we are unable to kill the problem and it keeps increasing every day.

A Anti-Virus is a software program used to identify and eliminateany viruses and malicious software found in the system. It restrictsTrojans, spy wares and other background programs from being installed on the system.

A Firewall keeps the computer safe from unauthorized access. TheseFirewalls can be software programs, Hardware devices or a combination of both.It guards the outside network from accessing the internal computer network.

The science of decrypting and encrypting information is called Cryptography.It is like sending a message to another user with a lock code which is only known to the sender and the receiver.

A few administrations attempt to stop criminal groups working inside their outskirts. Be that as it may, this is not a novel issue that applies just to cybercrime. The mentioned same issues are for the most part industrious to some degree over all criminal exercises. The mentioned nations are not essentially supporting cybercrime any more than they are supporting different manifestations of wrongdoing. There is a law authorization ability issue that must be determined over all sections of wrongdoing.

The crime scene is first accessed whenever a crime takes place. The computer is first collected as a evidence in the crime. There are four steps in the investigation:

Initial response

Evaluation and documentation of the scene.

Recording and competing the crime scene.

Processing the scene.

A crime is committed if the person access a computer network, computer system or computer without the owner's knowledge. Using the distributed method attackers can attack hundreds and thousands of internet users in any part of the world.

Table 1: Safe/ Unsafe use of Computers (GorazdMesko, Igor Bernik (2011))

CONCLUSION

Working with workstations, making utilization of versatile mechanisms to interface with the Internet and trade information, are presently every day events. Cyberspace has updated how clients access qualified information and make associations, and this has enormously affected our work, social connections and communications.

Our examination indicated that clients are generally educated about the different sorts of cybercrime; however the general population is more attentive to threats uncovered by the news media, than of the mentioned from which they might as well verifiably secure themselves. This scenario is the effect of an absence of information in certain regions, which is in turn because of the way that informative data innovation is currently accessible to anybody. Forms at the work spot are so streamlined that clients don't need any information about machine supplies and conveyance frameworks.Greater safety and better security is possible if the user behaves responsibility while using cyber space, knownby the previous researches and studies.General awareness regarding the dangers in cyber space will increase if the users are given more information about cyber threats.

New hacking techniques, criminals and viruses are born every day. Initially we did not have any laws or rules to guide the internet, but nowadays cyber law is increasingly catching up and it is becoming difficult to break the law online. Access to technology has become even easier and so people continue to spend more money and time on the internet. Every person spending time online could be a target of these criminals. These criminals work from different parts of the world and so they are difficult to catch. Hacking and cyber crime are only getting stronger. We should learn from past incidents to prevent such crimes in future.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now