On development of science and technology, the network technique is more and more advance and important. A lot of malware has appeared on the Internet. Malware is described some unsafe software, such as computer viruses, Trojan horses and spywares. Recently, it uses in order to invade any computer. Malware is exploited by hackers and governments to steal personal, financial or state secrets.
Logic Bombs It is an event dependent programme, as soon as the designated event occurs, it crashes the computer, release a virus or any other harmful possibilities. i. Web Jacking Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money. A case of web jacking is the ‘gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed.
This kind of crime is the illicit misuse of PC technologies, ordinarily including the Internet, to bolster violations, for example, misrepresentation, data fraud, sharing of data, and misappropriation. Precisely what is unlawful fluctuates significantly from domain to region. Thusly, the development of universal information correspondences and specifically the Internet has made these wrongdoings both more normal and more hard to police. Fortunately there are persons battling PC crimes and it is considered important by government offices. See beneath for a connection to the U.S. Division of Justice 's site about e-wrongdoing and their PC crime scene investigation exercises.
Because of this criminal can hack the user’s personal information like name, date of birth, social security number. With that information hacker can open a new account or can issue a new card with the same information (Sayles, 2012). The result of the data breaches is a type of identity theft, where personal information like credit or debit card numbers and social security numbers or
Cyber terrorism always work in hacking, misinformation, virus and worm. Hacking- hacking is gain access to a computer file or network illegally or without permission. Misinformation- misinformation is to provide using incorrect information Virus-virus a computer program that duplicates itself in harmful manner to a normal computer use. Most of the virus will attaching themselves to another program. The amount of damage varies and viruses may erase all data or to do nothing but reproduce themselves.
“The biggest difference between the two is the fact that the internet actually gives the offender an extra degree of protection”.http://onlinesense.org/5-differences-cyber-bullying-traditional-bullying/ (4). Why? Because when you are on the internet, bullies can harass and attack their targets anonymously. Cyberbullies often hide their identity while on the internet so the victim doesn't realize who the cyberbully is, making it hard for the victim to pinpoint who it is. “Another difference between cyberbullying and traditional bullying is that cyberbullying can happen anywhere.
Cyberbullying has been an issue, in the United States as well as everywhere throughout the world. Since the expansion and headways in technology, cyberbullying has been on the rise. The use of the Internet and technology to purposely harm another person in a hostile way. The viral idea of online life makes sending embarrassing or humiliating messages, pictures, or recordings straightforward and prompt and mysterious. Screen names effortlessly camouflage spooks ' characters.
Individuals should be prosecuted for statements made on social media. Statements made on social media can cause more than just emotional pain; it can also cause physical pain. Children/Adolescents can get injured because of cyberbullying. In “The Dangers of Cyberbullying” it says “Cyberbullying can also lead to kids getting physically hurt”. Cyberbullying can make a person feel less human, which could lead to them
The advancements in information technology (IT) have raised concerns about the risks to data associated with weak IT security, including vulnerability to viruses, malware, attacks and compromise of network systems and services. Inadequate IT security may result in compromised confidentiality, integrity, and availability of the data due to unauthorized access. It is important to ensure the individual privacy remains carefully protected and secured. What is information security threat? A threat is any circumstance or event with the potential to harm an information system can cause different types of damages that might lead to significant financial losses.
Cyber Crime is defined according to Techopedia as a crime in which the computer is the object or tool used to commit an offence such as child pornography and theft. Cybercriminals may use computer technology to access personal information and business trade secrets for exploitive or malicious purposes. Criminals may also use computers to spread viruses, interfere with communication and control document or data storage. Criminals who engage in such illegal activities are known as hackers. In addition, cybercrime may also be referred to as computer crime.
They intentionally release computer viruses. They steal sensitive personal, business, and government information. They steal money, crash websites, destroy files, and disrupt businesses. (pg. 230)” I agree with that quote, hackers are doing the harmful act of entering into someone’s privacy and gathering personal information with the intent to steal.