Cyber Crime – A Threat to Property, Persons, Societies and Government Ramandeep Kaur1, Neeru Sharda2 (original) (raw)

“Computer Crime: Crisis or Beat-Up?”

2001

The increased use of computers and communications technologies over the preceding decade has created considerable apprehension in the international community that they are being put to illegal use of various kinds. Fears of wide-scale electronic vandalism, copyright infringement,

Technological Paradox of Hackers Begetting Hackers: A Case of Ethical and Unethical Hackers and their Subtle Tools

Zambia ICT Journal, 2019

Computer crimes have been in existence for a long time now and hacking is just another way or tool that hackers are now using to perpetrate crime in different form. Hackers Beget Ethical Hackers. A number of people have suffered the consequences of hacker actions. We need to know who these hackers are. We need to know why these hackers exist because hackers have been there and will be there and we can be victims of their existence. In essence hackers seem to beget hackers and the tools that they use are getting more and more advanced by the day. We shall take a quick analysis of selected tools from thousands of tools used by ethical and unethical hackers. We shall systematically review three major types of hackers that we can identify. It is not easy to draw a line between them. Three main hackers and minor hackers have been discussed in this paper. The three main hackers are black hat, grey hat and white hat hackers. We have adopted a systematic review of literature to discuss and analyse some of the common tools the black hat hackers have developed to hack into selected systems and commercial software and why they do it?

Cybercrime is Very Dangerous Form of Criminal Behavior and Cybersecurity

Computer crime is a form of criminal behavior in which the use of computer technology and information systems is manifested as a mode of crime or the computer is used as a means or purpose of perpetration with which is producing some relevant criminal consequence. Computer crime is also an unlawful violation of property in which computer data is intentionally altered (manipulated by a computer), destroyed (computer sabotaged) or used in conjunction with hardware (theft of time). Objective of this paper is consideration of using new computer technology in everyday life. Unfortunately, some users using new technology for criminal acts. For Analysis, author use official resources from books, scientific papers and online resources. Even though it is a new technology, police and justice successfully deal with different types of computercrimes. New times bring new crimes. Humanity today is experiencing a time that is obsolete tomorrow in the technological-scientific sense. Revolutionary information achievements and at the same time their imaginative misuse pervade almost every sphere of human life and work. It is common knowledge that all developed countries in the world are primarily concerned with knowledge and capital, and only afterwards, labor, capital and other physically tangible benefits are the primary factors of their development and well-being. We are today witnessing a historical turning point that transformed the globalization division of the world into rich and poor into the same globalization division of those who possess knowledge and information and those who do not possess that knowledge or information without completely losing geographical position of state. People have become aware of the fact that information alone is a prerequisite for the dissemination of knowledge, and that knowledge is a major factor, that is, a prerequisite for any further development and prosperity of every developed society or state. The visible interest of all or even more developed countries in investing in "acquiring" and updating their IT staff should not be surprising. It is also not surprising that a large number of studies and specialized schools have been opened with a view to achieving IT literacy, and its standardization and even development within the borders of individual geographical regions, whether it is only in the territory of a particular country or in an area covering more than one country (such as European Union). It is important to note that investments in this direction are not small. The funds invested are very profitable, especially in the area of IT innovations that bring about changes in communication and social information, which is reflected in new knowledge and products that are being marketed on the world market every day. Among these economic and social abuses, abuse from the domain covered by cybercrime is the most prevalent today. The hidden privacy of the perpetrators, who can easily reach the outermost places with the help of phones and PCs, and entry into the computer systems of economic and governmental organizations and institutions for the purpose of harm or obtaining benefits are the greatest obstacle to all bodies and organizations concerned with preventing this new types of crime whose development can be compared with the development of information technology. In this

CYBER CRIMES

With increased use of computers in homes and offices, there has been a proliferation of computer-related crimes. These crimes include:

Hackers Cybercrime - Computer Security: Ethical Hacking

ARIS2 - Advanced Research on Information Systems Security

Today cybercrime is at a record high, costing businesses and individuals billions of dollars every year. What is even more frightening is that this figure represents just the last five years with no hope of it ever ending. The evolution of technology and the increasing accessibility of smart technologies means that there are many access points to users' homes to exploit. Cybercrime is on the rise in the world of technology today. Criminals using the technologies of the World Wide Web exploit the personal information of Internet users to their advantage. They happily use the dark web to buy and sell illegal products and services. They even manage to gain access to classified government information. While law enforcement tries to address the growing problem, the number of criminals continues to grow, taking advantage of the anonymity of the Internet.

THE EEFECTIVENESS OF HACKING AS A COUNTER-TERROSIM AND A

DANIEL ANYEMEDU, 2021

Given that hacking is defined as any unorthodox method of interacting with a system, it is straightforward to assume that a large number of individuals have hacked or attempted to hack someone or something. Hacking is on the rise, and current technology models are being used to aid in counter-terrorism and demonstrations. This indicates that, in order to minimize terrorism, more preventative efforts are necessary. Just as it's critical to comprehend terrorist characteristics in order to comprehend terrorist motivations and, as a result, develop and deploy terrorism prevention strategies, it's also critical to comprehend victims, i.e. the characteristics of computer system users, in order to comprehend how these users fall victim to terrorism. Currently, there is relatively little research on how to reduce and/or prevent terrorism victimization among users. That is, what makes each victim vulnerable, and how cybercrime prevention methods should be tailored to the victim's specific traits. As a result, it is feasible to discover synergies in the creation of terrorism prevention and/or reduction models by looking at classic terrorist preventive theories, models, and victim characterizations.

The Novelty of Cybercrime

2005

Abstract Recent discussions of 'cybercrime'focus upon the apparent novelty or otherwise of the phenomenon. Some authors claim that such crime is not qualitatively different from 'terrestrial crime', and can be analysed and explained using established theories of crime causation. One such approach, oft cited, is the 'routine activity theory'developed by Marcus Felson and others.