Chapter 3: The Dangers Of The Cyber World

Decent Essays
Chapter 3: The Cyber World

The cyber world or cyberspace is an online environment of computer networks through which you can communicate with other people.
It provides users with ways to conduct business and network with other people as easily as they do in the physical world. For example, online shopping has reduced trips to the market and social networking sites allow you to connect with friends staying thousands of miles away. In addition to all the benefits, there are some serious concerns too that the cyber world offers. Let’s learn more about the dangers of the cyber world so that we can keep ourselves safe.
By the end of this chapter, you will be able to:
• Explain the term cyberspace
• Identify various kinds of cyber crimes
• Explain
…show more content…
Different Types of Cybercrimes

Just like there are many different types of activities you can perform on the Internet, there are different types of crimes too. Let’s have a look at the most commonly performed crimes.
1) Cyber bullying
According to the National Crime Prevention Council, cyber bullying takes place “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.”
Cyber bullying involves acts that seek to control, manipulate, falsely dishonor, or humiliate a person or entity using the computer as a mode of communication. The actions are deliberate and done repeatedly on purpose with the sole intention of causing harm.
Cyber bullying is being increasingly used in schools. In a recent incident, a young school boy who was excellent in basketball had his jealous seniors bully him over the Internet as they could not prove themselves better at the basketball court. As a result, the young boy started to withdraw and his sport suffered.
This is an incident of cyber rime, and if reported, the accused may have to face serious legal consequences.
2) Cheating by
…show more content…
They may also perform tests and exposure assessments.

• Cracker – Black hat
A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc.
In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data. The hackers did not manage to destroy all the information on the website, only the home page was damaged, and the website was restored.

9) Skimming
Skimming is a cybercrime where scammers steal your credit / debit card details by fitting a skimmer device to an ATM machine. The device reads and records the card details from the magnetic strip on the card, resulting in misuse and frauds.
The information from the strip is ‘skimmed’ to create a fake or cloned card with the stolen details. The personal details and account numbers are used to borrow money or take loans in the victim’s

Related Documents

  • Decent Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    To make clear what a security attack is, it is a “A security event that has been identified by correlation and analytics tools as malicious activity that is attempting to collect, disrupt, deny, degrade or destroy information system resources or the information itself” (Gallagher). These attacks can come in any shape or form over the internet and with the little regulation over cyber threats internationally it needs to be a constant cause for alarm for agents. Verizon showed its 2013 data breach investigation report that 95 percent of the advance attacks came through emails that were containing malicious attachments which gave the attackers a a stepping stone into the host networks computers and network devises which then exposed the valuable and/or private…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Cyberbullying

    • 1652 Words
    • 7 Pages

    One type of cyber bullying would be cyber stalking, this is repeated unwanted messaging being sent to a person. Another type is cyber threats, this consists of threatening through the internet a person’s physical safety. Defamation is “dissing” someone on social media where all can see. Exclusion would be just excluding someone from a group message or event on purpose, not accidently. Another very common type of cyber bullying is flaming and trolling.…

    • 1652 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    In criminalistics of computer forensics class I have learned all types of crimes from auction fraud, credit card fraud, cellular fraud and my absolute favorite topic which is identity theft. Everyone probably doesn’t think that identity theft is a real crime. Believe it or not identity theft is one of the topic crimes in America today. Identity theft is often in the news. It is sad because someone will profit off of another loses.…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber terrorism could be also considered to be using the web to inform people of a Terrorist group. For example, hacking into a government control centers important files. However, people can protect themselves against the use of cyber terrorism. People’s passwords for google should be unusual, instead, check venders for for any new upgrades, or could create a unique email address and make it unknown to anyone. Using cyber terrorism is a serious crime and should be stopped.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    These “trolls” can be categorized into many different groups including: hackers, catfishers, and cyberbullies. First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards.…

    • 644 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nowadays many hackers found different ways to hack personal information of others such as bank details, credit card details, insurance details, business details and many more important files. With just detecting an IP address of internet user, the hacker can hack the full computer or smart phone and steal all the information. Normally, the victim doest know that their information is stolen. Other than that, cheating also is done through internet such as on social media on BlogSpot. Too much information in social media such as Facebook are seen and scanned by cheater around the world.…

    • 744 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Computer Viruses Research

    • 2066 Words
    • 9 Pages

    This can range from protecting Facebook conversation chats to protecting online bank account information. Even with things that are password protected hackers still seem to gain access to personal information. Hackers use different kinds of malware to cause damage to their victims. There are many kinds of malware in this world. However, there are…

    • 2066 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    In some cases, the theft could be a friend or family that comes to the house all the time. Technology has changed a lot of the years and the internet has connected the world together which improved communication. However, this also makes it easier for thieves to use computers and internet to steal information needed for identity theft. A lot of personal information is stored in databases on servers of different companies such as credit card information in online stores or at retail stores in the city, health information in the doctor’s office or hospitals, and there are many other places personal information is stored on. Another location would be social media, people with public profiles may not realize the information they post can be used for identity theft.…

    • 1567 Words
    • 6 Pages
    Decent Essays