Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АвтомобилиАстрономияБиологияГеографияДом и садДругие языкиДругоеИнформатика
ИсторияКультураЛитератураЛогикаМатематикаМедицинаМеталлургияМеханика
ОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРелигияРиторика
СоциологияСпортСтроительствоТехнологияТуризмФизикаФилософияФинансы
ХимияЧерчениеЭкологияЭкономикаЭлектроника

Bibliography. All of you have heard about computer crime

Читайте также:
  1. Annotated Bibliography
  2. Bibliography
  3. BIBLIOGRAPHY
  4. SELECTED BIBLIOGRAPHY
  5. V- Bibliography ……………………………………………………………. 10

Introduction

 

All of you have heard about computer crime. But you can’t imagine how large and complicated this sphere of crime, how many different types and method it includes. Below we try to ask what exactly netcrime mean, in which forms it can manifested.

Computer crime refers to any types of crime that include computer and network. The computer can be a target of crime or it may have been used like a tool of a crime. Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".[1] Such crimes may threaten a nation’s security and financial health.

Most sharply this problem is in copyright infringement, child pornography, and child grooming. Also there are some problems with private life when confidential information is lost or intercepted.

Internationally, both: the government and non-state actors – involved in cybercrime. It includes financial theft, espionage, and other cross-border crimes. However, the international legal system tries to keep actors responsibility through the International Criminal Court.

Computer crime includes extensive range of offence. Generally, it divided into two categories: crimes that target computers directly; crimes facilitated by computer networks or devices, the primary target of which is independent of the cats network or device.[2]

I Crimes that primarily target computer networks or devices include:

a) Computer viruses - a computer program that can replicate itself and transmitted from one computer to another.

b) Denial-of-service attacks (DOS attacks) – an actions from the actors, when they try to make machine or network resource unavailable to its users.

However, the targets can be different, generally con-artist try to attack target sites or services hosted on high-profile web servers such as banks, credit card and so on. Sometimes it can be servers of online games

c) Malware (malicious code) – a software used or created by attackers to crash you computer, disrupt you computer operation, steal confidential information or gain access to private computer systems. Malware include different form of software such as ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware and other malicious programs. The most popular malware is worms or trojans rather than others.

 

Main Part

 

II Crimes that use computer networks or devices to advance other ends include:

a) Cyber stalking is the use of the Internet or other electronic gadgets wit a view to harass or pursue individuals or companies. It may include false accusations and slander, threatening, damage to data or equipment and so on. Cyber stalking differs from other types of stalking in that it occurs with a help of internet or other electronic communication services.

b) Information warfare. This term involving the use and management of information technology in odder to achieve some benefits over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one's own information is valid, spreading of propaganda or disinformation to demoralize or manipulated his enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces[3].

c) Phishing scams – it is an attempt to acquire information such as usernames, passwords, and credit card details and so on, masking by reliable organization in electronic message. Phishing emails may contain links to websites that are infected with malware.

 

 

Conclusion

In conclusion needles to say that computer crime is really dangerous for anybody who has internet or mobile phone. The numbers of these crimes are growing each ear, and we should be quite cautions in odder not to be canceled.

Moreover, computer crime threatens not only for individuals, but also for government to. So the government should make any measures to prevent us and itself from this type o crime, and cut the ways to illegal enrichment in the internet.

 

 

Bibliography

1. Halder D.,Jaishankar K. Cyber crime and the Victimization of Women\\ Laws and Rights. USA: IGI Global. 2011

2. Moore, R. Cyber crime: Investigating High-Technology Computer Crime. \\ Cleveland, Mississippi: Anderson Publishing. 2005

3. Easttom C. Computer Crime Investigation and the Law. \\ URL: Amsterdam; Boston: Elsevier/Anderson Publ. p.112

 

 


[1] Halder D.,Jaishankar K. Cyber crime and the Victimization of Women\\ Laws and Rights. USA: IGI Global. 2011

[2] Moore, R. Cyber crime: Investigating High-Technology Computer Crime. \\ Cleveland, Mississippi: Anderson Publishing. 2005

[3] Easttom C. Computer Crime Investigation and the Law. \\ URL: Amsterdam; Boston: Elsevier/Anderson Publ. p.112


Дата добавления: 2015-10-29; просмотров: 125 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
о проведении Велофестиваля “Двухколесный друг” 24 августа 2013 года| Job Description

mybiblioteka.su - 2015-2024 год. (0.008 сек.)