Chapter 3: The Dangers Of The Cyber World

Superior Essays
Chapter 3: The Cyber World

The cyber world or cyberspace is an online environment of computer networks through which you can communicate with other people.
It provides users with ways to conduct business and network with other people as easily as they do in the physical world. For example, online shopping has reduced trips to the market and social networking sites allow you to connect with friends staying thousands of miles away. In addition to all the benefits, there are some serious concerns too that the cyber world offers. Let’s learn more about the dangers of the cyber world so that we can keep ourselves safe.
By the end of this chapter, you will be able to:
• Explain the term cyberspace
• Identify various kinds of cyber crimes
• Explain
…show more content…
Different Types of Cybercrimes

Just like there are many different types of activities you can perform on the Internet, there are different types of crimes too. Let’s have a look at the most commonly performed crimes.
1) Cyber bullying
According to the National Crime Prevention Council, cyber bullying takes place “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.”
Cyber bullying involves acts that seek to control, manipulate, falsely dishonor, or humiliate a person or entity using the computer as a mode of communication. The actions are deliberate and done repeatedly on purpose with the sole intention of causing harm.
Cyber bullying is being increasingly used in schools. In a recent incident, a young school boy who was excellent in basketball had his jealous seniors bully him over the Internet as they could not prove themselves better at the basketball court. As a result, the young boy started to withdraw and his sport suffered.
This is an incident of cyber rime, and if reported, the accused may have to face serious legal consequences.
2) Cheating by
…show more content…
They may also perform tests and exposure assessments.

• Cracker – Black hat
A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc.
In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data. The hackers did not manage to destroy all the information on the website, only the home page was damaged, and the website was restored.

9) Skimming
Skimming is a cybercrime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and records the card details from the magnetic strip on the card, resulting in misuse and frauds.
The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details. The personal details and account numbers are used to borrow money or take loans in the victim’s

Related Documents

  • Superior Essays

    Cyber Bullying Tracking

    • 1536 Words
    • 7 Pages

    What is cyberbullying? “Cyberbullying is intentional and repeated harm inflicted on people through the use of computers, cellular phones, and other electronic devices” (“Cyberbullying” 1). The use of technology today has greatly increased, and it is causing problems within the states. Schools are becoming more technological, and some schools even provide students with electronic devices. Four in ten teens have been bullied online, and girls are more likely to be victimized, rather the boys (Phillips). Online social media keeps growing, and it is causing cyberbullying to become more popular. “Nationally, 14.8 percent of students experienced online bullying, according to a 2013 study by the Centers…

    • 1536 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    Cyberbullying has been a major issue among children and young adults around the United States. Cyber bullying is directly defined as “willful or repeated harm inflicted through the use of computers, cell phones, and other electronic devices” (“What is CyberBullying?”). If an adult is involved in the incident, then it can be defined as cyber-harassment, or cyberstalking, which is a crime that has legal consequences (“Cyberbullying”). There is a clear difference between bullying and harassment;…

    • 1304 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Cyberbullying is the use of communication to bully a person typically by sending messages of an intimidating or threating nature to another person. Bullying of any form is people claiming a sort of power in their lives by seeking out those who seem vulnerable and attacking them. Cyberbullying occurs with kids that have problem interacting with other. Which makes it easy for bullies to pick on them. In different states there are different laws that stops cyberbullying. The following groups are listed under Baltimore anti-bullying laws. Race, Age, Marital Status, creed, religion, color, sexual disability sexual orientation, gender identity, gender expression, and national Origin.…

    • 602 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    cyber bullying takes place using electronics such as phones, computers, and or tablets. the sites could include social media or email, or through text messages. kids who are cyberbullied are usually bullied in person as well, people who are cyberbullied may also have a hard time getting away from certain behaviors. it happens all day everyday, it could happen to anyone. a picture can be posted on social media and it can be very difficult to remove once it is up there, and it is almost impossible to track the source once it 's in motion. social media is not to be blamed for cyber bullying as it can be used for good as well. but sometimes with certain people it can be used to harm others. people who are cyberbullied are more likely to use alcohol…

    • 1341 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    While some sites concentrate on laws that defend victims age 18 and under, Working to Halt Online Abuse is a help resource comprising of a list of up-to-date and unresolved cyberstalking-related in the United States federal and state laws. In addition, it lists those states that do not have laws yet and associated laws from other countries. The Global Cyber Law Database (GCLD) wishes to become the most inclusive and influential foundation of cyber laws for all countries.…

    • 1184 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Cyber-crime is the new crime of the new century and the advent of new technologies has allowed it to become a global epidemic. Globalization and cyber crime go hand in hand as they each have severe implications on the criminal justice system. People anonymously can commit crimes against people who live in different countries than them and make it impossible to trace and fiscally unfeasible to even try. The jurisdictions of the crime also are a factor. There is not a way to bring them to justice people can only be careful and protect his or herself.…

    • 864 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyberbullying is any bullying that occurs over the Internet. It can be saying, posting, or creating something, or doing…

    • 424 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards…

    • 459 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    KPMG International (2011), “Cyber crime – a growing challenge for governments”, online source Available at: https://www.kpmg.com/Global/en/IssuesAndInsights/Articles Publications/Documents/cyber-crime.pdf [accessed 11 October,…

    • 1283 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Remember getting on social media, seeing a post that made tears come rolling down? People in our world like to go on social media and make fun of other people, and these people are known as cyber bullies. What is cyber bullying? Bullying, in general, is an aggressive behavior that has any harm or influence on a person. The different types of bullying are physical bullying, cyber bullying, and verbal bullying. All types of bullying have a strong influence on a person. Cyber bullying is one of the many forms of bullying. While cyber bulling has been around for a while, the rate is steadily increasing as our Internet increases. More people are cyber bullied because the bullies target more than one person at a time. All cyber bullying is done on…

    • 774 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    Cybercrime is defined as “any illegal activity that uses a computer as its primary means of commission” (Rouse). Many of the world’s major countries…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber bullying is the use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature. Today bullies use cell phones or computers to cyber bully; the technology is so updated and high tech, you can literally do anything you can think of. When it comes to teenagers, bullying is basically a hobby for them; they feel no guilt for the things they do, even though they know what they are doing is hurting others. It is crazy to think that something as simple as clicking a button can severely affect a young adult’s future so easily (“Cyber Bullying Statistics”). If you want to be a bully and embarrass or torture someone as easily and as fast as you can, the internet is the place to do it (Parry). Twitter and Facebook are truly a nightmare to get on when you’re a victim of cyberbullying. Bullies tend to post photos and videos anonymously for the world to see (“What is Cyber Bullying”). They think it is safe to post anonymously because they feel they are less likely to get in trouble by parents or teachers. When things are posted on the internet or sent as text messages, no one truly knows what the words mean; they are just black words on a white screen. Bill Belsey, a writer from cyberbullying.org, says, “Cyber bullying is defined as: The use of information and communication technologies to support…

    • 1190 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Effects Of Cybercrime

    • 781 Words
    • 4 Pages

    Human development has resulted in the creation and development of technology for various reasons such as economic and social uses. The internet technology is one of the developments that has become so popular in the global society. Computers have made internet economy possible as multiple business activities were shifted online. Unfortunately, the growth of the internet brought about the evil of cybercrime that develops almost at a similar rate with internet technology. Cybercrime refers to the criminal activities that are perpetrated through the internet. It impacts the internet economy. damages competitiveness, trade, innovation, and overall economic growth.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    What Is Cybercrime?

    • 858 Words
    • 4 Pages

    "Cybercrime" is a criminal offense committed to internet technology (cyberspace), whether it attacks public facilities in cyberspace or private ownership. Technically such crime can be distinguished into off-line crime, semi on-line crime, and cybercrime. Each has its own characteristics, but the main difference between the three is the relationship with the public information network (internet).cybercrime is formulated as an act against the law that is done by using a computer network as a means / tool or computer as an object, whether to gain profit or not, to the detriment of other parties.…

    • 858 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    2.1 Hacking: This type of crime is very dangerous and punishable as it refers to the breaking down into the computer system so that one’s valuable data can be accessed easily without any permission in hacking criminal uses different software to enter a person’s computer and a person may not be aware of that his system is being used from another…

    • 1830 Words
    • 8 Pages
    Great Essays