Chapter 3: The Dangers Of The Cyber World

Superior Essays
Chapter 3: The Cyber World

The cyber world or cyberspace is an online environment of computer networks through which you can communicate with other people.
It provides users with ways to conduct business and network with other people as easily as they do in the physical world. For example, online shopping has reduced trips to the market and social networking sites allow you to connect with friends staying thousands of miles away. In addition to all the benefits, there are some serious concerns too that the cyber world offers. Let’s learn more about the dangers of the cyber world so that we can keep ourselves safe.
By the end of this chapter, you will be able to:
• Explain the term cyberspace
• Identify various kinds of cyber crimes
• Explain
…show more content…
Different Types of Cybercrimes

Just like there are many different types of activities you can perform on the Internet, there are different types of crimes too. Let’s have a look at the most commonly performed crimes.
1) Cyber bullying
According to the National Crime Prevention Council, cyber bullying takes place “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.”
Cyber bullying involves acts that seek to control, manipulate, falsely dishonor, or humiliate a person or entity using the computer as a mode of communication. The actions are deliberate and done repeatedly on purpose with the sole intention of causing harm.
Cyber bullying is being increasingly used in schools. In a recent incident, a young school boy who was excellent in basketball had his jealous seniors bully him over the Internet as they could not prove themselves better at the basketball court. As a result, the young boy started to withdraw and his sport suffered.
This is an incident of cyber rime, and if reported, the accused may have to face serious legal consequences.
2) Cheating by
…show more content…
They may also perform tests and exposure assessments.

• Cracker – Black hat
A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc.
In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data. The hackers did not manage to destroy all the information on the website, only the home page was damaged, and the website was restored.

9) Skimming
Skimming is a cybercrime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and records the card details from the magnetic strip on the card, resulting in misuse and frauds.
The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details. The personal details and account numbers are used to borrow money or take loans in the victim’s

Related Documents

  • Improved Essays

    Embedded Assessment

    • 776 Words
    • 4 Pages

    The cyber world has given bullies an advantage to deliberately harm others or exhibit hostility towards a particular individual through a computer screen or a mobile site. A harmful act of cyber bullying involves creating a fake account or webpage to mock someone or harass them. According to the National Crime Victimization Survey, it is estimated that about 2.2 million people under the age of nineteen experienced cyber bullying in 2011. 71.9% reported that they were bullied only a mere amount of once or twice in the school year. 19.6% have said that they were bullied once or twice a month.…

    • 776 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Regulation A preponderance of states have laws that include comprehensive electronic forms of conveyance within stalking or harassment laws. Most law enforcement agencies have cyber-crime units and Internet stalking is frequently treated with more severity than reports of physical stalking. Guidance and resources can be found by state or area. Schools The safety of schools is exponentially becoming a focal point of state legislative measures.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Violence can cause desensitization, which can cause the victim to think that violence isn’t wrong, or even cause the victim to become violent or abusive themselves. In addition, violence can cause or worsen the effects of mental illness, contribute to low self esteem, increase the risk of substance abuse/ addictive behaviours, and increase the risk of the victim being suicidal or self harming. If one of those things impacts the victim, there is a higher chance of the other effects affecting the victim as well, as there is a correlation between violence, mental illness, suicidal behaviour/ self injury, and substance abuse. Cyberbullying is any bullying that occurs over the Internet. It can be saying, posting, or creating something, or doing…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    With the huge transformation of the internet, a new type of bullying has emerged. Unlike Physical and verbal bullying, cyber bullying involves no face-to-face interaction. Cyber bullying is when a person uses the internet, cellphones or any other digital technology to torment or threaten another. Teenagers are the ones who are most commonly engaged in cyber bullying. Cyber bullies believe that it is easier to hide and they can easily get away with online bullying, rather than a physical engagement.…

    • 887 Words
    • 4 Pages
    Improved Essays
  • Brilliant Essays

    1.0 INTRODUCTION: Nowadays, the technology has made computer crime has been increasing at an alarming rate. Rapid development of information technology (IT) has brought with many new applications and opportunities that brings positive and negative effect in our lives. In addition, people around the world can communicate in real time on variety types of devices such as cell phones, tablets, computers and etc.…

    • 1780 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    Rummaging through rubbish for personal information (dumpster diving) Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized Using public records about individual citizens, published in official registers such as electoral rolls Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, housebreaking or mail theft Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards Using 'contactless' credit card readers to…

    • 459 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    There are two types of online bullying. " The two types of online bullying are cyber bullying and trolling." (Youth Studies Australia.) Like I said previously, cyber bullying is when a victim is being targeted by humiliation, harassment, and or threatened on the internet.…

    • 590 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Website Deacement Analysis

    • 1102 Words
    • 5 Pages

    Nearly every page has a picture captioned with a real case related to what is being discussed on the page. Also, it discusses the real life damages cybercrimes cause. Many of the cybertheft examples were accompanied by the amount of money that was lost or stolen through the illegal transactions. This helped put the severity of these crimes into perspective. Then, the book provides readers with ways the government has been combating these crimes.…

    • 1102 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Cyber Crime Research Paper

    • 1158 Words
    • 5 Pages

    Cybercrime: The Easy Way to Commit a Crime Cybercriminals are able to commit detrimentals crimes with a click of a few buttons. Cybercrime is the “unauthorized use or disruption of computer files... the theft of an electronic identity...the use of a computer to facilitate or carry out a traditional crime (Engdahl 100).” According to the author of the article “Cybersecurity,” cyber attacks are becoming more and more common.…

    • 1158 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    One of the newer methods is cyber bullying. Cyber bullying is different than traditional ways of bullying. All bullying is hurtful and can affect society in negative, permanent ways, or it can help people grow and better themselves. According to NoBullying.com, every one in…

    • 555 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Cyber Bullying Tracking

    • 1536 Words
    • 7 Pages

    Bullying Is Whack, Get On the Right Track What is cyberbullying? “Cyberbullying is intentional and repeated harm inflicted on people through the use of computers, cellular phones, and other electronic devices” (“Cyberbullying” 1). The use of technology today has greatly increased, and it is causing problems within the states. Schools are becoming more technological, and some schools even provide students with electronic devices. Four in ten teens have been bullied online, and girls are more likely to be victimized, rather the boys (Phillips).…

    • 1536 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cyber bullying Thesis statement – cyber bullying is the act that occurs using electronic technology. It may include different forms of devices like computers cell phones and also tablets and any other means of social media communication tools. Cyber bullying is a problem known globally. Sometimes it may be unnoticed most of the times when it happens, but cyber bullying can be very destructive and most of the times are very lethal to those people who are being bullied.…

    • 829 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber Bullying Prevention

    • 1054 Words
    • 5 Pages

    How Can Cyberbullying Be Prevented on Instagram? Cyberbullying is a serious problem that occurs in around half of the teenage population. Approximately 10-20% of teens are victims of repeated cyberbullying. According to StopBullying.org, “Cyberbullying is bullying that takes place using electronic technology.…

    • 1054 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Effects Of Cybercrime

    • 781 Words
    • 4 Pages

    Cybercrime has bad influences in Growth of Internet Economy Human development has resulted in the creation and development of technology for various reasons such as economic and social uses. The internet technology is one of the developments that has become so popular in the global society. Computers have made internet economy possible as multiple business activities were shifted online. Unfortunately, the growth of the internet brought about the evil of cybercrime that develops almost at a similar rate with internet technology. Cybercrime refers to the criminal activities that are perpetrated through the internet.…

    • 781 Words
    • 4 Pages
    Improved Essays