For instance, a person consider committed cyber theft when the person hack the bank security system can make a forgery of vanishing money from bank account holders. In this modern society, network is the most common daily things that we in touch, hence cyber criminal can always commit a crime whenever they want to via the network that already prepared there. Cyber crime is a worldwide crime that happen everywhere and anytime. This crime should be hunt down as quick as possible as it harm individual privacy, however, this crime is too hard to detect. The technical bureaus’ ability to support investigation and to deal with the cyber crime are not good enough said the new police commissioner of the Royal Cayman Islands Police Service, Derek Byrne (Moonet,
The company had installed spam filters in order to shield the firm from cyber-attacks, but some fraudulent emails still went through. In one such case, the email appeared to be from the Finance Department and required some information including passwords. The employee gave the information in the email not realizing it was a fraudulent email and the firm faced great financial losses as their entire data got wiped out. This is one of the most common reasons for small and medium sized businesses to shut down, thus hampering the economy. The situation could have been easily avoided had the employee contacted the person in charge.
cyber-crimes against property these crimes target personal, government and private institution and aim to destroy the important document or special programs. Furthermore, there are several characteristics for cyber- crime such as difficulty to knowing the perpetrator of the crime only by using high-technology for security, the difficulty to know the damage from it because the damage is moral not tangible .Also easy the users fall into it because the lack of security control and easy of hiding and appearance the features of the crime and who is the criminal. (2)(3) Moreover, every crimes whether traditional or electronic crimes have motivations. Such as electronic crimes have goals like illegal material or immoral gain through information technology as fraud in credit card, hacking, destruction of websites and theft the financial account. Also, collecting information and confidential documents for institution, government, banking and personal to blackmail them.
1.0 Introduction Nowadays, new technology can make new criminal opportunities can happen in this era. Cyber-crime can be categorized in various categories such as Cyber espionage, identity fraud, and ransom ware and so on. As we can see the different use of the computerized is about the technology alone and lacking for any improvement that may exist between several realms of criminal activity. Cyber-crime, mostly including the Internet, communicates to an expansion of existing criminal conduct nearby some of new illegal activities. The technology used to keep an eye on casualties, and the inspirations driving them change.
Despite the fact that computers have become an important part in the lives of individuals and institutions, computers have indirectly opened a way for the existence of new unethical behaviors and different methods to commit abnormal acts and crimes using computers. We need to acknowledge how to protect ourselves from different computer crimes by having a security awareness .In this chapter we will discuss four common computer crimes, they are: 1. cyber stalk 2. Internet fraud 3. identity theft 4. online piracy 8.1: Cyber stalk Cyber stalk is a constant monitoring and harassment to the victim by using electronic communication. For example, publishing false accusations that affect victim 's reputation, sending anonymous e-mails for the purpose of threatening or scaring the victim, and tracking the victim 's IP address. Cyber stalking is sometimes referred to as cyber harassment or cyber bullying.
The biggest nuisance and threat for innocent online users are the hackers and spammers. In today 's globalization millions of people from different countries share their personal details on the internet through social networking sites like Facebook, Twitter, etc. As people share their personal information online; often their accounts are compromised by criminals and there are several instances where heinous crimes such as rapes and murders also takes place. There are hackers who extort money by tricking those using the internet into believing that they have won huge chunks of money. They will ask them for bank details or credit card pin numbers.
Cybercrime is crime that involve with a computer or network. The computer always been used to commit cybercrime. All over the world cybercrime mostly affect psychology and physically. Nowadays, all these cybercrime cases are increase and become more serious and very difficult to be handling by the government in all countries and by the authorities. Crimes such as identity theft, cyber bullying, fishing, transaction fraud are the most cases that involve in cybercrime.
Internet fraud has been extremely successful that it continues to grow for scamming purposes. Cyberbullying also leads to serious even dangerous problems in the society such as increasing the number of suicides. Lastly, irresponsible posts are often very misleading yet become media to dividing the society. The US Department of Justice has advised that to take safety precautions by installing antiviruses, limiting personal data we put on our social media, having a better judgment of who to interact with online and using reliable sources of information. It’s better not to share posts which are probably hoaxes.
According to credit-checking firm Experian the rate of identity theft increased between the years of 2010 and 2012. Experian says one of the main areas where identity theft has taken deep roots is the cybercrime with criminals having to use hacking to obtain information or sending viruses that attack computers to obtained classified information. The question lies on where the loop holes are. Is it with the government authorities that have not done enough or the citizens that do not understand on the existence of cyber-crime? This study will seek to understand why individuals fall prey of identity thieves and also to get to understand the relationship between the criminals themselves and their targets.
Threat of Cyber terrorism In the contemporary world, terrorist often use cyberspace to cause doubt. These terrorists fight against government and state institutions to attain their own goals. Notably, terrorists perform cyber-attacks in two forms; they attack data and interfere with control systems (Pereski & Bogdanoski, 2012). Stealing data and damage is the common type of computer and internet attacks. Cyber-attacks aimed at control systems disrupt or manipulate the physical infrastructure.