StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Cybercrime: Identity Theft - Assignment Example

Cite this document
Summary
This assignment "The Cybercrime: Identity Theft" discusses cybercrimes that are among the most dangerous crimes in the modern world. Identity theft is an extremely multifaceted and complex phenomenon. The technical and institutional issues are in a large number in the list of scientific studies…
Download free paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
The Cybercrime: Identity Theft
Read Text Preview

Extract of sample "The Cybercrime: Identity Theft"

The Cybercrime. Identity Theft. What is this? How to distinguish this phenomenon and protect oneself against it? Title Date Abstract This work is devoted to the topic of the identity theft, which is one of the top problems in the modern world. The development of the computer systems and internet resources is always accompanied with the development of cybercrimes and computer viruses as the tools for committing this type of crimes. No one has the insurance against being a subject to the cybercrime, but we can learn more about it and protect our information, because currently, computer crime reaches the international scale. This work sums up the information from the well-known websites of Encyclopedia Britannica, Presti and Naegele and Interpol. Also there are citations from such works as Cybercrime: Criminal Threats from Cyberspace by Susan W. Brenner, How organised is organised cybercrime? Global Crime by J. Lusthaus, Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet by Eoghan Casey and Cyber Criminology: Exploring Internet Crimes and Criminal behavior by K. Jaishankar. The aim of the present work is to study such phenomena as identity theft and computer crime. Keywords: Internet, information, identity theft cybercrime, computer, virus The technological revolution has led to a major social change, the most important of which is the emergence of a new kind of public relations and public resources - information. Since that time there appeared the question of controlling the access to the information, its preservation. Organizational measures, as well as software and hardware protection proved to be ineffective. Most acute shape this problem of unauthorized interference gained in the countries with highly developed technologies and information networks. While many types of cybercrime require a high degree of organization and specialization, there is insufficient empirical evidence to ascertain if cybercrime is now dominated by organized crime groups and what form or structure such groups may take (Lusthaus, 2013). Objects for such criminal attacks may be the hardware, material objects or software and databases; the computer can act as a subject or as an instrument of abuse. There are many types of computer crimes. They are the unauthorized access to information stored in the computer and start the software "logic bombs" that are triggered when the certain conditions are met and partially or completely incapacitate a computer system, also it could be the development and distribution of computer viruses, and theft of computer information. Especially important and one that worth be noted is the computer information, owned by the state or its agents. According to the information, given on the Interpol website, these crimes can be divided into three broad areas: (a) attacks against computer hardware and software, for example, botnets, malware and network intrusion; (b)financial crimes, such as online fraud, penetration of online financial services and phishing; (c) abuse, especially of young people, in the form of grooming or ‘sexploitation’. The most simple reason for hacking is curiosity. Hack "on a bet" - is also a very common case. Contest between two or more hackers on the principle of " too much to hack an account?». Jealousy can also cause cracking page on the social network. Especially as the Internet is full of ads and commercials such as "find out with whom your girlfriend is writing in a social network." The situation becomes more serious when the account has been cracked to blackmail. Its no secret that personal information is available for the circle of elected members. Address, place of work, mobile phone number, references to mutual friends in correspondence - much of it can be the subject of blackmail. The most common example is when in correspondence with your best friend, you mention "fine evening" youve spend on a business trip. You discuss this adventure with all the details, and after some time you get an email or mobile phone message with the threat of telling all about that evening to your wife. Next, you may follow the condition of the provision of any services related to your place of work. For example, to issue a credit for a figurehead, if you take the high chair in the Bank. Sometimes the matter is in giving certain amount of money for the blackmailers silence. Then to get rid of the blackmailer will be very difficult. By the way, sometimes representatives of internal affairs also use such methods in order to find people who are hiding from the long arm of the law. Cracking account of any suspect and identifying his circle of acquaintances, it is possible to find the accomplices or a place the stolen goods are hidden. To protect yourself against federal tax-identity theft, you are advised the following: 1. Do not give out personal information (and the SSN in the case of the US) 2. on the phone, fax or on social media platforms use a shredder to destroy tax related documents after tax time is over and keep the necessary ones in a safe (thieves can look through the trash) 3. For taxpayers planning to e-file their tax returns, it is recommended to use a strong password. Afterwards, save the file to a CD or flash drive and keep it in a secure location. Then delete the personal return information from the computer hard drive. 4. US citizens should show employers their Social Security card at the start of a job, but otherwise do not routinely carry the card or other documents that display their SSN. Additionally, it is recommended not to fill the Social Security number on medical forms and such documents (in case your wallet or purse gets stolen) So, we can say that there are several major types of cybercrime, and they are all committed with the help of the Internet network. Not the least important is also the Digital Piracy which is widely spread in the Europe. Virus programs that can crack the banking system and government sites, all of them are very complex in their structure and are extremely dangerous. Currently, all countermeasures against computer crimes can be divided into: technical, organizational and legal. The technical measures include protection against unauthorized access to a computer system, backup important computer systems, the adoption of structural measures to protect against theft and sabotage, power redundancy, development and implementation of specific hardware and software security systems and etc. Organizational measures include protection of computer systems, recruitment planning, having a plan of the network center recovery after its failure, etc. Legal measures should include the development of liability establishing standards for computer crimes, copyright protection of programmers, improvement of the criminal and civil laws and legal proceedings. Here we can conclude that it is very difficult but very important to protect the information resources from all sides. Network security becomes more important. However, not all the people believe that this is the best solution to the problem of protection. It should be seen globally. It is really necessary to protect information during all its travel from the sender to the recipient. In conclusion we want to stop on the point that the cybercrimes are among the most dangerous crimes in modern world. The identity theft is extremely multifaceted and complex phenomenon. In the world and especially in our country, the technical and institutional issues are in a large number in the list of scientific studies. Many governmental organizations are formed to discover new and better ways of protection against the internet swindlers. Many different ways of defense are available now, and if the society needs to protect their information it should be done on the every level properly. References Jaishankar K. (Ed.) (2011). Cyber Criminology: Exploring Internet Crimes and Criminal behavior. USA: CRC Press, Taylor and Francis Group Interpol website. http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime Presti and Naegele - Guard Against Taxpayer Identity Theft http://pntax.com/resource-center/newsletters/ Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, USA. 2010, pp. 91 Lusthaus, J. (2013). How organised is organised cybercrime? Global Crime. USA Casey Eoghan (2011). Digital Evidence and Computer Crime, Third Edition: Forensic Science, Computers, and the Internet. Academic Press. p. 840. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Online identity theft Assignment Example | Topics and Well Written Essays - 1500 words - 1”, n.d.)
Online identity theft Assignment Example | Topics and Well Written Essays - 1500 words - 1. Retrieved from https://studentshare.org/literature/1658213-online-identity-theft
(Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words - 1)
Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words - 1. https://studentshare.org/literature/1658213-online-identity-theft.
“Online Identity Theft Assignment Example | Topics and Well Written Essays - 1500 Words - 1”, n.d. https://studentshare.org/literature/1658213-online-identity-theft.
  • Cited: 1 times

CHECK THESE SAMPLES OF The Cybercrime: Identity Theft

Cybercrime and Privacy

The personal details shared by individuals online are accessible to everyone thus making it highly susceptible to misuse, and thefts of identity by cybercriminals (Brenner viii).... Significance, scope and extent of the problem: “Undeterred by the prospect of arrest or prosecution, cyber criminals around the world lurk on the Net as an omnipresent menace to the financial health of businesses, to the trust of their customers, and as an emerging threat to nations' security” Marc Goodman The study of cybercrime raises several critical questions regarding the protection of privacy and more specifically the increasing loss of privacy....
9 Pages (2250 words) Research Paper

Effects of Cybercrime

According to Brenner, cybercrime, commonly known as e-crime/computer crime, is a criminal act whereby computer or computer networks serves as a target, location, means or as the source of the activity.... he greatest effect of cybercrime is the loss of intellectual property as well as confidential information of the business.... Partially, cybercrime is not a zero-game because the stolen information is not fully gone....
5 Pages (1250 words) Essay

Evolution of Cybercrime

Additionally, the essay provides an insight on the impact that identity theft has had on individuals and society as a whole.... Moreover, the essay looks at the penalties that are imposed on the offenders who are found guilty of committing identity theft.... This is then followed by a comprehensive view of the challenges faced by the law Lastly, the essay provides a conclusion that looks into how technology can be used by the law enforcement agencies to prevent and address identity theft as well as how such technology can be of benefit to the society....
14 Pages (3500 words) Assignment

Cybercrime and Privacy

Online fraud and identity theft have been a big part of our society today.... This paper aims to discuss and analyze various issues related to cybercrime and the manner in which such crimes lead to a negative impact on the people as well as society as a whole.... Additionally, the writer of the paper will debunk some of the myths related to cybercrime.... However, adjustments need to be made to stop cybercrime, but they also need to be reasonable in terms of the rights of internet users....
5 Pages (1250 words) Term Paper

The Cyber Threats in Saint Louis County

In the present day context, crimes are mostly driven by technology which includes 'identity theft', 'intellectual property theft', and 'payment card scam' among others.... Hence, it is recommended that the cybercrime task force must increase its cooperation with the law-enforcing bodies In order to effectively combat and eliminate risks of cybercrime....
9 Pages (2250 words) Case Study

Cyber Crime in the United Arab Emirates

The offenders carry out these crimes in a number of ways such as: cyberbullying, sexting, identity theft, cyber-attacks, and hacking among others.... There are a number of cybercrimes and they include attacks on computers, cyber-bullying, email spam and phishing, identity theft, cyber-attacks, hacking, sexting, online scam or fraud as well as online trading issues to name a few (EFG 9).... While law authorities are busy trying to root out his problem, very many individuals are becoming victims of such crimes of hacking and identity theft (EFG 23)....
8 Pages (2000 words) Report

Computer Security and Identifying Cybercrime

Up till now a large number of security threats have emerged in the world of computing, however, identity theft is believed to be the most critical computer crime among all of them.... This paper presents an overview of identity theft.... This paper presents a review of the literature on identity theft.... The author of the paper "Computer Security and Identifying cybercrime" will begin with the statement that after entering into the twenty-first century, there have emerged a large number of new technological revolutions and inventions, which have impacted the ways of life to a great extent....
9 Pages (2250 words) Research Paper

Differences between Investigating Traditional Criminal Offences and Cyber Offences

This is because as opposed to traditional crimes, which are committed from places that can be easily located and their effects are restricted to a given geographical area, cybercrimes can be committed by individuals whose identity and even location may not be easy to detect.... Compared to traditional crimes, cybercrime is relatively easy to commit, but often hard to detect, investigate, and prosecute.... Compared to traditional crimes, cybercrime is relatively easy to commit, but often hard to detect, investigate, and prosecute....
12 Pages (3000 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us