Publically available data on internet are utilized for this purpose. Basically unauthorized access or hacking of data is not involved. More specifically, government agents who promote online news articles and positive comments fall under IO. Terrorist group who involve in false advocacy of information, embed hidden message, and attempt to recruit the followers also use IO. Shutting off portions of the internet, filtering/blocking websites, monitoring user activities are includes in IO.
They try to find loop holes in the network, user’s system and then try to exploit them by capturing their sensitive data which is meant to be kept private up to them, they then leak the sensitive data publically by selling them to other party. V. FACTORS FOR MOTIVATION OF HACKING Few studies have been carried out into hacker motivation, although much has been gained by interviewing former hackers who have now gone 'white-hat' (i.e. hacking for security companies etc.). Here are some of the factors that may motivate a person into becoming a
Sometimes hacking is done just because of the personal offenses. As computers have become an important part in a business. This means hackers can use computers to commit fraudulent acts such as privacy invasion, stealing corporate or personal data and etc.This can be an issue to the business and may cause chaos if something like this takes place. There can be loss of service as the company may lose its data due hackers exploiting it, stealing it and then erasing it. Thus, This can lead to a poor reputation of the company and nobody might again rely on this company due to this incident.
They try to steal the identity of the genuine customers in various malicious ways and try to use their resources in unauthorized way. Thus, the organisations wants systems to detect such frauds to stop the economic losses they suffer and the customers trust is also at stake. The basic approach of anomaly detection techniques is to maintain a customer’s profile and monitor the profiles to detect any unexpected behaviour or deviations. Under this category comes following
These hackers abuse the trust between a website and a visitor’s computer to execute code in order to have thousands of computers mine this digital currency, or cryptocurrency, for them. As the computing community evolves and hackers progress the hack that they carry out seem less and less humane. This hack, among many others, brings up serious concern on the wellbeing of the Internet and the people who use it; security, or lack thereof, of companies that we trust with our personal information was also brought was because of this hack.
The basic aim of phishing attacks is to steal personal credentials from users such as online banking user id and password and credit card data. The electronic commerce organizations have been faced and lose their reputation because of these phishing tricks. The attackers use a combination of technical and engineering spoofing techniques and make a financial profit. In these techniques, the attacker use legitimate-looking but fake emails and use fake websites for steal important information. There are many types of anti-phishing solutions proposed to tackle these tricks and attacks but still the user’s personal information and security are on risk.
However, the more that technology has become advanced, hacktivists have also found means in breaking into the computer system of other people. Though it can be considered that hacktivists have noble intentions because they hack computer systems for political and social reasons, it cannot be denied that at certain instances, the right to privacy of the people is violated. Thus, hacking becomes unethical depending on the circumstances. For the purposes of this paper, hacktivism will be discussed, when it becomes ethical and unethical, its main problem, and its political impact. What Hacktivism Is According to Trend Micro (2015), there are two types of hackers: the first one break into computer systems to point out flaws in the security and the second one do hacking for a certain cause.
But as everything as a flip side, the internet poses a huge risk to everyone who uses it. As sharing increases over the internet, one’s privacy is hampered. Hacking has resulted in private information being accessed and misused. Viruses, Malwares and Trojans have made the entire internet experience really unsafe. Computer viruses
Despite the fact that computers have become an important part in the lives of individuals and institutions, computers have indirectly opened a way for the existence of new unethical behaviors and different methods to commit abnormal acts and crimes using computers. We need to acknowledge how to protect ourselves from different computer crimes by having a security awareness .In this chapter we will discuss four common computer crimes, they are: 1. cyber stalk 2. Internet fraud 3. identity theft 4. online piracy 8.1: Cyber stalk Cyber stalk is a constant monitoring and harassment to the victim by using electronic communication. For example, publishing false accusations that affect victim 's reputation, sending anonymous e-mails for the purpose of threatening or scaring the victim, and tracking the victim 's IP address. Cyber stalking is sometimes referred to as cyber harassment or cyber bullying.
However, many people misuse social media through cybercrimes such as internet fraud, cyberbullying and irresponsible posts. A fraud is an illegal deceptive act that people use to trick others for personal gain. Based on the Scams and Safety article provided by The Official US FBI website (2016), internet