StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Keylogger scam. Computer crimes - Book Report/Review Example

Cite this document
Summary
Modern times of technology and virtual networking have given birth to another level of fraudulent crimes being committed across the globe. Cyber crimes have caused losses of millions of dollars to citizens, corporations and government of the United States…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Keylogger scam. Computer crimes
Read Text Preview

Extract of sample "Keylogger scam. Computer crimes"

Download file to see previous pages

Keylogger scam, as discussed in this paper, refers to hidden logging systems installed by hackers which track all activities of users, maintains logs of keys and passwords and gives constant monitoring capabilities. This paper entails the types of computer crimes existing in our society, technological safeguards available and examples of frauds that have practically occurred in past. Computer crimes Computer crimes are against social morals and ethical norms since they are aimed at causing harm to an individual financially or otherwise.

Stealth of intellectual property, private content and valuable information can be used for illegal and unethical purposes. Extortion, vandalism, terrorism, theft, laundering, piracy, fraud and other social evils are common unethical practices. Cyber crimes are of various types, including theft of telecommunication services, piracy of copyrighted digital content, hacking of official organizational sites to gain benefits and intercepting communication lines. More severe cases involve electronic money laundering, concealment of income to evade taxes, misrepresented investment opportunity schemes, identity theft and fraudulent transfer of funds (Grabosky & Smith, 1998).

Most of cyber crimes involve hacking and accessing information through keylogger programs which are installed on host machines to track information entered and activities carried out at these workstations. Keylogger systems are very common for gaining access to passwords, codes and other sensitive information. In a recent case, the British Hi-Tech Crime Unit stopped an attempted electronic funds transfer of $420 million within banks of different territories. Investigation revealed that criminals had infiltrated computer systems of bank through information gained through installed keylogger applications.

This raises concerns about how these programs were installed in the systems without physical interception (Betteridge, 2005). Preventive measures These technological frauds can only be stopped with help of technology itself. Several measures must be taken in order to safeguard against any outsider breaches. Primarily, a network-based firewall must be created by establishing access control lists to identify what traffic is allowed to pass through communication lines. Secondly, antivirus software must be installed with latest updated virus definitions to enable systems to detect any infectious malwares and Trojans.

Physical safeguards are very essential as seen in given case study where keylogger applications were apparently installed on systems through physical intrusion. Biometric devices must be installed at entry points and various identification checks must be placed in sensitive areas. A common technique of cryptography is used by organizations to encode information through ciphering tools prior to sending it in transit. The intended user of information shall decrypt information with known pass keys to access it.

Additionally, periodic testing of networks must be scheduled where technicians use tools to check vulnerability of network and its workstations to being bypassed by unauthorized users. Constant monitoring of network traffic will enable management to detect interception and illegitimate access attempts. At national level, regulatory frameworks have been established including Computer Fraud and Abuse Act, Electronic Communications Privacy Act and Internet Spyware Prevention Act etc. Legislations must be amended with provisions that ensure strict compliance with latest technological changes.

Success stories There have been several similar cases in the past where cyber crimes were successfully executed and subsequently caught by

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Keylogger scam. Computer crimes Book Report/Review”, n.d.)
Keylogger scam. Computer crimes Book Report/Review. Retrieved from https://studentshare.org/information-technology/1482434-week
(Keylogger Scam. Computer Crimes Book Report/Review)
Keylogger Scam. Computer Crimes Book Report/Review. https://studentshare.org/information-technology/1482434-week.
“Keylogger Scam. Computer Crimes Book Report/Review”, n.d. https://studentshare.org/information-technology/1482434-week.
  • Cited: 0 times

CHECK THESE SAMPLES OF Keylogger scam. Computer crimes

Phishing Computer Crimes

PHISHING computer crimes Phishing computer crimes Author Author's Affiliation Date With the passage of time, huge developments have been done in the field of computer science.... ?? Additionally, the computer crimes appear in a wide variety of ways and also cause a number of serious problems for different people.... In addition, Hacker and Cracker are most widely used terms in computer crimes.... Also, the company should hire trustworthy personnel to minimize crimes related to computers (Parker, 2002; Worthington, 2003, pp....
4 Pages (1000 words) Research Paper

Personal Security and The Internet

This paper begins by looking at the manner in which the internet influences the lives of human beings.... It will explore both the negative and positive effects of the internet.... The paper also explored the online fraud cases that are associated with the internet in business organizations.... hellip; The internet is one of the greatest innovations of the 20th century....
12 Pages (3000 words) Research Paper

Computer Crimes in the USA

In the paper “computer crimes in the USA” the author analyzes cyber crimes, which have assumed frightening proportions throughout the world.... Especially, the developing world is more prone to becoming a hotbed of computer crimes as the law enforcement agencies there are bereft of the requisite training.... In the absence of such intimidating technological deterrents, computer crimes are thriving and proliferating like never before....
8 Pages (2000 words) Article

Categories of Computer Crime

computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and… Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files.... The misuse of the computer may involve the falsification of computer signatures through Running Head: computer crimes Categories of computer crimes School computer crimes Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless....
2 Pages (500 words) Essay

Spyware and Viruses

Spyware is kind of malware, which is installed on a computer without approval or awareness of the owner with the aim of gathering the private information of the owner.... It is usually hidden such that the user can not know about it, and collects information regarding the internet… In addition, they can affect the performance of a computer negatively by the installation of more software, which redirects the web browser searchers, reducing the speeds of connections, changing Moreover, it can be used as a kind of adware, whereby the unsolicited pop-up ads are delivered by the software on top of tracking the behavior of the user....
17 Pages (4250 words) Term Paper

International Analysing Different Dimensions of Cyber-Warfare

A theoretical background encompassing the concept of cyber warfare would reflect upon the motives behind such attacks and incorporation to the growth journey of these crimes.... The paper "Analysing Different Dimensions of Cyber-Warfare" discusses that targeted attacks can be referred to as those when a specific victim is to be targeted....
15 Pages (3750 words) Research Paper

History of Phishing and Development

computer crime is acknowledged as unlawful activities by making use of a computer or against a computer system.... The Internet's user-friendliness and convenience have fashioned modern ways for computer crime, well-known forms of which is phishing (Laudon & Laudon 1999, p....
20 Pages (5000 words) Research Paper

Internet-Based Security Risks and Attacks

… The paper “Internet-Based Security Risks and Attacks” is a thoughtful example of coursework on information technology.... Cloud Computing is a cost-effective, flexible, as well as a recognized delivery platform that offers consumer or business IT services through the Internet....
8 Pages (2000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us