StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Notion of Cybercrime - Essay Example

Cite this document
Summary
The essay "The Notion of Cybercrime" focuses on the critical analysis of the definitions and examples related to cyber theft and cyber vandalism. It also determines the reasons and significant challenges concerning traditional law enforcement and other issues associated with cybercrime…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.8% of users find it useful
The Notion of Cybercrime
Read Text Preview

Extract of sample "The Notion of Cybercrime"

Cybercrime OVERVIEW According to the recent observations, it has been determined that around 2.3 billion of the people worldwide have access to the internet. In this respect, it is becoming difficult to track down the biggest crimes involved with the internet that do not include any of the electronic tracking devices that are attached with the IP connectivity i.e. internet protocol. Cybercrime is defined as the act that is executed against the availability, confidentiality and integrity of the internet users. In terms of the global connectivity, cybercrime reflects a broad distribution within the financial-driven acts. Apart from this, it also reflects the computer-content acts with regard to the confidentiality along with accessibility of the computer systems (NCPC, “Preventing Identity Theft: A Guide for Consumers”). Thesis Statement. This study intends to delineate definitions and examples related to cyber-theft and cyber vandalism. Apart from this, the study will also determine the reasons and significant challenges with respect to the traditional law enforcement and other issues associated with cybercrime. DEFINITION OF CYBER THEFT AND CYBER VANDALISM AND TWO EXAMPLES OF EACH Cyber theft primarily refers to an act by which the internet is used in order to steal, interfere or enjoy someone else’s property. In simpler term, cyber theft is executed to derive others’ financial and personal information for illegal use. One of the examples of cyber theft is hacking of a bank’s computer data for wrongfully transferring the financial information and monetary amount i.e. ‘Nigerian prince email’. Another example of cyber theft is hacking of accounts of Barclays Bank (The Huffington Post, “Barclays Bank Cyber Theft: 8 Arrested For Allegedly Hacking Computer System, Stealing $2 Million”). Vandalism is the concept that reflects an action that involves the destruction or damage with respect to the public or the private property. Cyber vandalism is carried out mainly using electronic information. It has been further observed that specific crimes with regard to cyber vandalism include website defacement. Furthermore, the attacks with respect to social web pages are also regarded as cyber vandalism. One instance of cyber vandalism is the hacking along with impairment of ‘Google’s Pakistan page’. The hackers’ replaced the logo of the ‘Google’s Pakistan page’ by ‘two penguins walking up a bridge at sunset’ (The Express Tribune News Network, “Cyber vandalism: Hackers deface Google Pakistan”). Moreover, the other example of cyber vandalism is gaining access of the United States Justice Departments Website by certain unknown hackers and replacing it with a label of “Department of Injustice” along with a picture of Adolf Hitler as well as a swastika (Anderson, “The New Vandal”). LIST THREE REASONS THAT CYBERCRIME POSES A SIGNIFICANT CHALLENGE TO TRADITIONAL LAW ENFORCEMENT In recent scenario, the communication is mainly conducted through the internet with a motive to follow the lawful obligations. However, increasingly in modern day context, the internet is being used for conducting fraudulent activities. It has been observed that as technology has assisted in the development and the improvement of the society, in the similar manner it is also being used for fraudulent practices. The challenge pertaining to the law enforcement that addresses the cybercrime mainly surrounds its nebulous nature. In this respect, it has been further identified that the investigation concerning to cybercrime involves a higher degree of uncertainty. It is usually difficult to access as well as identify the type of crime committed. Another challenge being faced by the traditional law enforcement is the use of the internet for the criminal purposes. It has been observed that the cybercrime being conducted is usually white-collar crime, but it acts as a challenge for the Federal Bureau of Investigation (FBI) to locate the place pertaining to the crime. Another challenge faced by the traditional law enforcement is a lack of coordination amidst the concerned agencies of law (FBI.gov, “Testimony”). WHAT STEPS DO YOU BELIEVE CAN BE TAKEN TO HELP TRADITIONAL LAW ENFORCEMENT AGENCIES ADDRESS THESE CHALLENGES In accordance with combating the accelerated rate of cybercrime in recent scenario, it is necessary for the law enforcement agencies to mitigate the prevailing challenges. It is a vital aspect for the law agencies to ensure the reporting of the crime and location within a shorter tenure. Besides, it is also important for the FBI agents to ensure the implementation of the latest and advanced techniques for emphatic execution of the law enforcement capabilities. It is necessary for FBI agents while working in the environment, which has no boarders and endures multiple laws to ensure effective jurisdiction. Implementation of the information security regulations is another step to mitigate the challenges associated with cybercrime law. Cybercrime can also be combatted by ensuring awareness within the societal context. These concerned steps are applied to enhance the legal securities and regulations with regard to cybercrime (Digital Community, “Cyber-Crime: Law Enforcement Must Keep Pace with Tech-Savvy Criminals”). WHAT IS IDENTITY THEFT? WHAT ARE SOME COMMON WAYS THAT CYBERTHIEVES STEAL SOMEONE’S IDENTITY? Identity threat occurs when someone intentionally transfers, uses and also possesses the identification of the other person without the lawful authority. The grave challenge imbibed within the identity threat is its connectivity with others crimes (NCPC, “Preventing Identity Theft: A Guide for Consumers”). In accordance with the portals of the United States, it can be determined that identity theft has taken a greater toll in this country. There are various ways by which the identity thieves usually commit their crimes. These ways are mentioned hereunder: They usually file the changed address form in the name of other person and gradually derive their personal information They usually steal the credit card and the outgoing mail details and use them for personal gain Furthermore, these thieves usually hack the account of other persons and steal their valuable and important information to use them for fraudulent practices They also use the cell phone camera to click and keep the ATM card or the credit card number ‘Skim’ is the other method used wherein the merchant usually copies the credit card number by use of magnetic strip and later on uses it for personal gain (NCPC, “Preventing Identity Theft: A Guide for Consumers”) WHAT ARE SOME STEPS INDIVIDUALS CAN TAKE TO PROTECT THEMSELVES FROM IDENTITY THEFT? As discussed above, identity threat is one of the most common and dangerous forms of cybercrime, which is needed to be mitigated at the earliest. There are few measures that can be undertaken in order to combat identity threat. The measures are described hereunder: The users can avoid the online payment of bills through their personal mails, instead they can go for the governmental portal sites to suffice their requirements It is advisable for the users to avoid writing their account number anywhere On further note, to avoid identity theft, ATM’s must be used very cautiously. It is advisable for the users to use the service alone and not to let anyone enter the cabin Payment of bills must be made from the secure portal to avoid any hacking of personal account It is necessary for the credit card users to keep a constant check on their credit accounts It has been observed that the identity thieves have been found to hack the accounts details from the medical charts within the hospitals CHOOSE THE PROFILES OF TWO OF THE FBI’S MOST WANTED CYBERCRIMINALS. DISCUSS THE CRIME THEY ARE ALLEGED TO HAVE COMMITTED AND THE STEPS YOU BELIEVE CAN BE TAKEN TO REDUCE THE CHANCES THAT SUCH CRIMES WILL BE COMMITTED IN THE FUTURE Alexsey Belan and Peteris Sahurovs are the two profiles in the list of the FBI pertaining to the most wanted cybercriminals. Alexsey Belan has been suspected for encroaching the computer networks of the three US based companies related to e-commerce. It has been determined that he had stolen all the personal databases of the company and had exported it in the server. The FBI has kept a reward of around US$1,00,000 for providing any information about the intended person (FBI.gov, “Cyber’s Most Wanted”). Peteris Sahurovs was under the allegation of being involved in a cybercrime scheme worldwide, which took place in the year 2010 in between the month of February and September. This person had provided electronic information about a fictitious hotel in his website and was running the advertisements pertaining to it. On further observation, it is recognized that he replaced the advertisement with a malware. Users, who visited the site, were asked to purchase the software for US$49.95 in order to get control over their computers. The person who did not purchase the software, their computers used to crash down and the information became inaccessible (FBI.gov, “Cyber’s Most Wanted”). Works Cited Anderson, David L. The New Vandal. n.d. Web. 16 Mar. 2014. “Cyber-Crime: Law Enforcement Must Keep Pace with Tech-Savvy Criminals.” Digital Community, 2009. Web. 16 Mar. 2014. “Cyber’s Most Wanted.” FBI.gov, n.d. Web. 16 Mar. 2014. “Testimony.” FBI.gov, n.d. Web. 16 Mar. 2014. “Preventing Identity Theft: A Guide for Consumers.” NCPC, 2005. Web. 16 Mar. 2014. “Cyber vandalism: Hackers deface Google Pakistan.” The Express Tribune News Network, 2014. Web. 16 Mar. 2014. “Barclays Bank Cyber Theft: 8 Arrested For Allegedly Hacking Computer System, Stealing $2 Million.” The Huffington Post, 2014. Web. 16 Mar. 2014. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybercrime Essay Example | Topics and Well Written Essays - 1250 words”, n.d.)
Retrieved from https://studentshare.org/law/1633346-cybercrime
(Cybercrime Essay Example | Topics and Well Written Essays - 1250 Words)
https://studentshare.org/law/1633346-cybercrime.
“Cybercrime Essay Example | Topics and Well Written Essays - 1250 Words”, n.d. https://studentshare.org/law/1633346-cybercrime.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Notion of Cybercrime

How can we safeguard against the cybercrime

If that is true, what will be the major types of cybercrime?... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.... cybercrime is also part of white collar crime and is seen as the most sophisticated type of crime in the 21st century.... A number of nations and governments are working round the clock with specialized units to help in stopping cybercrime.... cybercrime: The transformation of crime in the information age....
3 Pages (750 words) Essay

Constitutional Challenges Associated With Investigating Cybercrimes

Technological developments especially in respect to cyberspace have been inarguably beneficial to human beings and have positively impacted on how they conduct business and how they live (Ditzion, et al.... 2003).... .... ... ... The rapid internet growth has enormously expanded the means of communications....
10 Pages (2500 words) Term Paper

Cybercrime and Privacy

Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy.... The issue of cybercrime, has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U....
9 Pages (2250 words) Research Paper

Capacity Building as an International Response to Cybercrime

The primary aim of the discussion is to illustrate the probable and the potential measures to eradicate or control the extensive presence of cybercrime within a society.... The discussion further focuses on depicting capacity building as an international response towards cybercrime.... According to the report Capacity Building as an International Response to cybercrime, people in the society need to deal with several challenges in relation to privacy....
15 Pages (3750 words) Assignment

Cybercrime and Privacy

The issue of cybercrime has been growing consistently and is now known to be one of the most serious and globally recognized internet crimes in recent times, causing millions of dollars worth of losses every year in the U.... This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole.... Additionally, the writer of the paper will debunk some of the myths related to cybercrime....
5 Pages (1250 words) Term Paper

Analysis of Gary McKinnon - UK Hacker Case

"Analysis of Gary McKinnon - UK Hacker Case" paper is based on the severity of crime McKinnon committed and the risks involved in cybercrime.... cybercrime has become one of the most dangerous threats for every nation across the globe.... This was an international cybercrime....
5 Pages (1250 words) Case Study

Analysis of Hacktivism on Social Change

The paper "Analysis of Hacktivism on Social Change" tells that WikiLeaks had to switch its website-hosting provider and sourced bandwidth from Amazon.... Amazon recanted its service from WikiLeaks after a Senator questioned the company's involvement with the whistleblower website.... ... ... ... In 2010, WikiLeaks' website crashed and remained inaccessible for more than 24 hours....
9 Pages (2250 words) Term Paper

Cybercrime: Policing and the Changing Criminal Landscape

The paper "cybercrime: Policing and the Changing Criminal Landscape" has discussed the role of police in the fight against cybercrime and how they are limited currently in their efforts to reduce the rates of crimes committed with the aid of digital devices.... This paper is going to examine the role of the police in fighting cybercrime.... It will also determine the extent to which police are limited in fighting this new era of crime and what can be done to enhance their efficiency in dealing with cybercrime....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us