代写范文

留学资讯

写作技巧

论文代写专题

服务承诺

资金托管
原创保证
实力保障
24小时客服
使命必达

51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。

51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标

私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展

积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈

Cybercrime

2013-11-13 来源: 类别: 更多范文

1. INTRODUCTION In the advance world, people use their computer skill to make something illegal such hacking others computer, stalking others blog, spamming and so on. These entire attitudes are very bad and dangerous to other people and especially for government securities. There are so many definitions which are found by various researchers and journalist. For example, according to Fafinski and Minassian (2008) had stated that “cybercrime is the transformation of criminal or harmful behavior by networked technology. While, Wilson (2007) puts it simply as “crime that is enabled by or that target computers”. Besides them, Zeviar-Geese suggest that the definition of cybercrime is broader, including activities such as fraud, unauthorized access, child pornography and cyber stalking. Plus, based on McConnell International (2000) had claimed that “cybercrime is harmful acts committed from or against a computer or network. To conclude, cybercrime is the transformation of criminal or harmful behavior by networked technology by Fafinski and Minassian (2008). Malaysia is the well-known state which is also provided by advance technology skill. Since all the system and works are done by computer technology, there are so many problems that people had to face up. 2. CONTENT 1. CLASSIFICATION OF CYBER CRIMES Malaysian people who are works for government or private company also need solve their problem by their own. Most of them do not know what the cybercrime is. Even most of them had used their email account for every day; they are also doing not know the spamming email is the one of cybercrime. Cybercrime can be dividing into four major categories. For the first category is cybercrime against individual. This category is including email spoofing, spamming, cyber defamation and also harassment and cyber stalking. ReportCyberCrime had noted that email spoofing is a spoofed email is one in which email header is forged so that mail appears to originate from one source but actually has been sent from another source. Plus, Mat Bright (2011) had stated that “a spoof email is one which has been doctored to look as though it has come from a particular sender (such as eBay or Paypal), when in reality it has come from someone completely different. A spoof web page is one which includes text and graphics stolen from the genuine web site (such as eBay or Paypal)”. In addition, spamming means sending multiple copies of unsolicited mails or mass emails such as chain letters and cyber defamation will occurs when defamation on takes place with the help of computers and or the internet. For example, someone publishes defamatory matter about someone on a website or sends emails containing defamatory information. ReportCyberCrime is also stated that “cyber stalking means following the moves of an individual’s activity over internet. It can be done with the help of many protocols available such as email, chat rooms, and user network groups. The example of cybercrime against individual had shown by Nandini R P, which is a girl in Ahmedabad was lured to a private place through cyber chat by a man, who, along with his friends, attempted to gang rape her. As some passersby heard her cry, she was rescued. Nandini R P also had shown another example is called Melisa Virus, “The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide. In the United States alone, the virus made its way through 1.2 million computers in one-fifth of the country's largest businesses. David Smith pleaded guilty on Dec. 9, 1999 to state and federal charges associated with his creation of the Melissa virus. There are numerous examples of such computer viruses few of them being "Melissa" and "love bug". Another category is cybercrime against property. Based on ReportCyberCrime, cybercrime against property can be dividing into three subcategories which are credit card fraud, intellectual property crimes and internet time theft. They also stated that the intellectual property crimes are includes software privacy: illegal copying of programs, distribution of copies of software, copyright infringement, trademarks violations and theft of computer source code. V. Shiva Kumar had claimed the internet time theft, “This connotes the usage by unauthorized persons of the internet hours paid for by another person”. Another definition of intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade secrets, and trademark violations. A copyright is the legal right of an author, publisher, composer, or other person who creates a work to exclusively print, publish, distribute, or perform the work in public, Anon. The United States leads the world in the creation and selling of IP products to buyers nationwide and internationally. Examples of copyrighted material commonly stolen online are computer software, recorded music, movies, and electronic games. The third category is cybercrime against organization. There are eight subcategories such unauthorized accessing of computer, denial of service, virus attack, email bombing, salami attack, logic bomb, Trojan horse and data did ding. According to V. Shiva Kumar, “unauthorized access to computer system or network which is the activity is commonly referred to as hacking. The Indian Law has however given a different connotation to the term hacking”. Plus, he also claimed that denial of services, “This involves flooding computer resources with more requests than it can handle. This causes the resources to crash thereby denying authorized users the service offered by the resources”. Other resource which is ReportCyberCrime had suggest that virus attack is the computer virus in which a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly involved) copy of it. These viruses can be file inflecting or affecting boot sector of the computer. Worms, unlike viruses do not need the host to attach themselves to. They also claimed that the email bombing, “sending large numbers of mails to the individual or company or mail server thereby ultimately resulting into crashing” and salami attack, “when negligible amounts are removed and accumulated into something larger. These attacks are used for the commission of financial crimes. ReportCyberCrime had also mentioned about Logic Bomb, Trojan Horse and Data Did Ding whereas “It is an event dependent programme, as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities”, “an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing” and data did ding, “this kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Last but not least is cybercrime against society. According to ReportCyberCrime, this crime are include forgery which is the currency notes, revenue stamps, mark sheets and extras can be forged using computers and high quality scanners and printers. Besides forgery, cyber terrorism and web hacking are also in this category. They also stated that cyber terrorism is the use of computer resources to intimidate or coerce others. While, the web hacking is about the hacker gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. REFERENCE Fafinski, S. & Minnassian, N. 2008. Uk Cybercrime Report 2008. New York, Garlik. ReportCyberCrime. 2011. Classification of Cybercrime. Galaxy Web Links Ltd. http://www.reportcybercrime.com/classification.php. (9:14 pm) Mat Bright, 2011, Phishing Email Scams, http://www.auctoo.com/ (9:53 pm) . Marc D. Goodman and Susan W. Brenner, Year unknown. The Emerging Consensus on Criminal Conduct in Cyberspace. McConnell International. 2000. Cyber Crime…and Punishment' : Archaic Laws Threaten Global Information. McConnell International LLC. . . Nandini R. P., Year unknown. Cybercrime. Pavan Duggal, Supreme Court advocate and cyber law expert. http://library.thinkquest.org/06aug/02257/more.html (10:19 pm) . . V.Shiva Kumar, Year unknown, Cybercrime – prevention & detection. http://www.cidap .gov.in/documents/Cyber%20Crime.pdf (10:41 pm) . Wilson, C. 2007. Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress. Congressional Research Service. . Zeviar-Geese. 1997-1998. California Pasific School of Law: The State of the Law on Cyberjurisdiction and Cybercrime on the Internet. Gonzaga /journal of International Law. Vol 1 . Anon. Cyber Crime - Intellectual Property Theft. http://law.jrank.org/pages/11992/Cyber-Crime-Intellectual-property-theft.html (10:58 pm) .
上一篇:Death_and_Impermanence 下一篇:Credit_Appraisal