Вы находитесь на странице: 1из 3

Cybercrime started when computers and networks came into play in the late

1990s. In the past, Cybercrime was less malicious than it is in our modern society.
According to Cross Domain Solutions, hacking was mainly used in the past to get
more information regarding specific systems. It is also said that in the past people
had competitions regarding hacking to see who could hack the most secure servers
out there. This hacking competition resulted in the breaching of many servers, such
as commercial servers, as well as military information. At first hacking was not
taken seriously because people though it was just a small problem that they did not
have to deal with, but eventually hackers decided to hack technologies with
malicious intent. Hackers started to steal peoples information, and even purposely
slow down systems. As times went by, technology grew and hackers became more
skilled. They quickly adapted to the constant advancement of technologies and
started using their newfound skills to exploit others. In modern society, cybercrime
has steered away from simple competition, Hackers started to realize that they
could directly benefit from hacking. Instead of getting a job and making money
legitimately, they found out that they could easily exploit people and reap the
benefits that way. The fear of modern hacking is not like the traditional fear of
crime, such as stealing, mugging, or stealing. Cybercrime has a major advantage
because the person does not have to be physically there to commit the crime.
Crimes can be committed in any location across the world that has internet access,
which makes it very difficult for law enforcement to apprehend the criminals.
Cybercrime can be linked to 3 different categories. The first being individual,
where cyber criminals attack an individual or a group of people. In this case, the
most common crimes consist of cyber stalking, distribution of pornography, or sale
of illegal items. The second category would be property. Property mainly is linked to
hacking or any type of cyber crime that causes harm to a persons property, such as
stealing, scamming, or the use of software to damage any type of property. The
third category is government. This category consist of very important documents
being stolen, or leaked from a government agency. We are currently seeing a rise in
this in our current era. This type of crime is known as cyber Terrorism. Cyber
terrorism can cause major breaches in security, and can cause mass panic.
Generally, this type of cyber crime is committed by nations who are not allies with a
certain country. These hackers can hack government websites, or government
databases to leak information or to steal it. The perpetrators can also use this
method to spread propaganda to create distrust in a country.
Definitions:
1. Cybercrime:
a. Any criminal activity that is carried out using any type of technologies,
such as a computer or a mobile device.
2. Hacking:
a. Using a computer to gain unauthorized access to information or
systems.
3. Phishing:
a. A practice where you send fraudulent email to gain access to accounts
or information that is not yours, Generally you are trying to steal
password or other types of informations.
4. Cyber Stalking:
a. The use of technology to harass a victim. Generally this can mean
threatening messages via social media or being extremely creepy over
the internet.
5. Cyber Terrorism:
a. The use of technology to gain access to secret information regarding a
political standpoint. Hackers may hack government servers to steal
information or to cause panic among a country.
6. DDos:
a. DOS is a type of attack that targets a single system and brings down
that system. DOS stands for denial of service and is usually used to
shut down a system, or render it useless. Attacks may be temporary or
permanent depending on how severe the attacks are.
7. Computer:
a. Is a device for storing and processing data. Hackers may use this
device to commit cybercrimes.
8. Cyberwarfare
a. When countries fight, each other using technology. This may include
leakage of government secrets, or simple attacks that render another
parties technology useless. Nations may use certain information to
cause panic.
9. Computer fraud
a. Use of computer to gain benefits from another party. This can consist
of people, companies or the government. Usually consist of identity
theft, or money theft.
10.Dark Web
a. The Dark web is used so that users may be anonymous. Although the
dark net is not totally bad, it is generally known that users use the dark
net for drug trafficking, media exchange, and other trade of illegal
items.
Bibliography
Brenner, Susan W. Cybercrime and the Law: Challenges, Issues, and Outcomes. ,
2012. Internet
resource.
Brenner, S.W. Crime Law Soc Change (2006) 46: 189. doi:10.1007/s10611-007-
9063-7
Cardwell, Kevin. The Best Damn Cybercrime and Digital Forensics Book Period.
Burlington, Mass:
Syngres, 2007. Internet resource.
Wall, David. Cybercrime: The Transformation of Crime in the Information Age.
Cambridge: Polity, 2007.
Print.

Вам также может понравиться