Skip to main content

CyberCrime | Essay, Sample

CyberCrime Essay

 

Cybercrime 

Cybercrime involves the use of computers and networks to commit crimes. With the advancement in technology, computers can be used to commit crimes or to target victims. Criminals commit these offenses against groups or individuals with the motive of harming the victims' reputation intentionally, cause mental or physical harm either directly or indirectly. These criminal activities are aided by the use of modern telecommunication technology such as mobile phones and the internet. This type of crime can adversely affect the financial security of both the government and the private sector. Organizations, government and the citizens should enact appropriate security measures to mitigate the possibilities of becoming victims of cybercrime. 

Cybercriminals have advanced their illegal activities, making it possible for them to be involved in various criminal activities such as hacking, child pornography, and copyright infringement. These illegal activities have no borders and can either be virtual or physical. Cybercrime can be divided into three broad categories, which include abuse such as sexploitation, financial crimes like online corruption and phishing, and computer software and hardware attacks like network intrusion and malware. Cybercrime can be classified into different groups depending on their targets and effects on victims. 

Computer communications systems in an organization or between individuals can be denied service because of the criminal activities of malicious hackers. This type of criminal attack is referred to as Cyber extortion. The hackers can regularly disrupt computer-based communications such as the use of emails or hack organizational websites and later demand money to stop their attacks. Cybercriminals target corporations and organizations that have a  strong financial base, cripple their networking operations and demand for cash to restore the service. The denial of service strategy can make an organization lose its reputation due to the inability of its customers to access the website leading to loss of revenues. 

Another cybercrime activity is cyberterrorism. Cyber-terrorists coerce or intimidate organizations, individuals or the government by launching an attack on their computer networks and any information stored on their computers. This is the act of terrorism that is committed to the use of computer resources or cyberspace (Moore, 2014). The cybercriminals can spread propaganda that there will be insecurity in some regions or town without specifying a particular date. Information on insecurity is a concern to any government and the citizens. The propaganda forces the authorities to increase their security detail to combat any incidence of insecurity. Cybercriminals can also participate in hacking activities that are directed towards families, individuals or organizational networks. Their primary intention includes creating fear or collecting useful information that can be used to blackmail or rob organizations and individuals. 

When computers are used to target individuals, they become a tool for cybercrime instead of being a target. This type of cybercrime does not involve the use of technology because the terrorists target the weaknesses of the individual. They cause psychological damage to their victims, and this makes it difficult for the individual to take legal action. The government, organizations and the citizens must put appropriate measures in place to ensure that they eliminate all cybercrime activities. Cybercrime adversely affects the way business activities are carried out and can lead to the closure of reputable organizations. Everyorganization should enforce internationally accepted cybersecurity measures with the attempt of curbing cybercrime. If these strategies are implemented, the cybercriminals will find it difficult to perform their illegal activities. 

References 

Moore,R. (2014). Cybercrime: Investigating high-technology computer crime. Newark, NJ:
LexisNexis/Matthew Bender.

Comments

Popular posts from this blog

How to Write a Character Analysis | Essay Writing Tips

How to Write a Character Analysis First, you need to choose, which character you're going to analyze. I suggest you choose a character, who changes. If you have to write about Finding Nemo, (The Walt Disney story), then you might be tempted to choose Nemo, because, after all, the title has his name in it- he must be the main character. But, really, the character, who changes the most and who really goes on a journey, is the Father- Marlin, so he's the character best suited for a character analysis.  So, number one- choose a character, who changes! All right, now you've chosen which character to analyze, you're going to have to think of inferences. Let me give you an example of what I mean by that. Here's some…here's an inference down here, but let me start with this-“FACT: Marlin hovers”. We know (if you've watched this film) that Marlin is the dad and he hovers over his son and doesn't want to let him be independent and try new things or t...

Ethical Aspects of Cloning | Essay, Sample

  ETHICAL ASPECTS OF CLONING  Cloning refers to the somatic cell nuclear transfer that creates biological material that is genetically identical to the parent (Reeve, 2013). For instance, an organism or organ can be used to create genetically identical replicas. As such, the process of cloning creates a genetic duplicate. The discussion over whether there is any ethical justification for cloning is very polarizing. This is because many arguments have been advanced to support and reject cloning, particularly concerning the potential medical benefits and fate of the rejected clones. In this respect, the ethical debate is centered on what is to be done with excess clones and how they are disposed off (Morrison, 2013). Therefore, the subject of cloning generates a lot of ethical debates since it presents potential benefits as well as harm.  As earlier indicated, cloning involves the creation of replicas that are genetically identical to the parent. In this case...