Computer And Internet: The Dangers Of Cyber Crime

Amazing Essays
1. Introduction
In today’s life computer and internet has become a basic need of life. They are the mediator of our life. One shares information, store information through internet. Now a day’s internet is a back bone of the society. One can use internet from anywhere and anytime and is easily accessible. The growing dependency on internet world is termed as cyber world. The augmentation in the usage of internet has enabled an increase in the volume of cybercrime activities because there is no longer a requirement of the criminal to physically present when committing a crime.
Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business. It is such a big threat to the cyber world. Anyone using his mastermind can take out any personal or professional information by applying some techniques to the software.
…show more content…
Types of Cyber Crime
2.1 Hacking: This type of crime is very dangerous and punishable as it refers to the breaking down into the computer system so that one’s valuable data can be accessed easily without any permission in hacking criminal uses different software to enter a person’s computer and a person may not be aware of that his system is being used from another

Related Documents

  • Decent Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Unfortunately with that success, there are more opportunities for hackers to override those systems in order to steal information from unsuspecting users who have entrusted their most private information into the computer system. With credit card, bank account and all personal information stored on the computer now, all of…

    • 1143 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    They may also perform tests and exposure assessments. • Cracker – Black hat A cracker gains unauthorized access to computer systems for personal gains with unethical intentions, such as stealing corporate data, violate privacy rights, stealing funds, etc. In the recent past, the official website of the government of Maharashtra was hacked on September 20, 2007. The state government took the help of the Cyber Crime Branch to investigate the case. The website contained detailed information about government departments, circulars, reports, and similar other important data.…

    • 1304 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their…

    • 1458 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Governments hack into another government 's files to steal information such as defense plans. This is the main goal for government hackers. Other hackers who commit cyber-terrorism of try to cause panic and chaos. Most of these hackers are individuals or small group with not known ideology. One group known as Anonymous is one of the most infamous groups In the United States.…

    • 1267 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cybercriminal Crimes

    • 779 Words
    • 4 Pages

    They are cyber criminals that can anonymously attack anyone from behind a computer (Vigoroso). These criminals can do anything from stealing some quick cash to stealing someone’s very identity. These types of crimes are on the rise worldwide and can leave victims financially crippled. Cybercrime is defined as “any illegal activity that uses a computer as its primary means of commission” (Rouse). Many of the world’s major countries…

    • 779 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    These are professionally organized groups which maliciously hack into systems for online money grabbing. This is a major security concern as these groups manage to get away with passwords and other credentials which enable them to steal from online money baking systems. Another security issue includes the hacktivists for instance the infamous anonymous group (Singer & Friedman, 2014). The hacking game has been taken to another level as politically motivated information systems hackers are now doing it in the open and is being acknowledged and accepted as a form of political activism. Political hacktivism is therefore posing serious threat to the security in IT industry as victims feel the monetary pain to forceful compelling to certain political affiliations (Shoemaker & Sigler,…

    • 1268 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Human fear is a symbol that people all over the globe are being greatly concerned of why terrorism is occurring and is characterized by the influences of using many forms of terrorism such as hacking Government facilities. In the past, terrorism has been compared with how the government works and has control over power. If terrorists get too carried away, then the government will use the power to hurt society and kill innocent people. There is no actual definition of…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    It is sad because someone will profit off of another loses. Identity theft is where the illegal use of someone else 's personal information especially in order to obtain money or credit (Johnson, 2014). When it comes to identity theft there are all types of ways to commit identity theft. This paper will be an overview over all aspects of identity theft. After reviewing…

    • 1648 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Cyber terrorism is the use of technology to cause fear. The FBI says that cyber terrorism is,” The premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub-national groups or clandestine agents” (Coleman). Today, computers and the internet are used for many things. Sensitive information is stored without much thought about its security. A terrorist could take advantage of these security flaws and steal the information.…

    • 1462 Words
    • 6 Pages
    Decent Essays