A research paper on Influence of contemporary technology on cyber crimes
ABSTRACT
Keywords: Cybercrime, cyber security, Hacking, spoofing, Cyber stalking, DOS Attack, Computer Vandalism, Cyber terrorism,Softaware Piracy, Phishing, Data diddling, Virus/ Worms, Trojan ,Cyber Laundering, Cyber contraband.
This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cybercrime and an introduction to cyber security as a weapon against cybercrime. The paper is best suited for those who want to understand what cybercrime exactly is at the beginners’ level and what are the prevailing cybercrimes.
Cybercrime involves using computers and Internet by individuals to commit crime. Cyber terrorism, identity theft and spam are identified as types of cybercrimes. The study identified some of the causes of cyber crimes to include urbanization, unemployment and weak implementation of cyber crime laws. The effects of cybercrimes on organizations, the society and the country in general include reducing the competitive edge of organizations, waste of production time and damage to the image of the society. With society venturing into cashless society, there is a need for cybercrimes menace to be minimized if not completely eradicated. Some of the ways of combating such crimes include taking reasonable steps to protect ones property by ensuring that firms protect their IT infrastructure like Networks and computer systems; government should assure that cyber crime laws are formulated and strictly adhered to and individuals should observe simple rules by ensuring antivirus protection on their computer systems. Don't use plagiarised sources.Get your custom essay just from $11/page
Cyber Crime is one of the words frequently used by individuals in our contemporary Society. To understand the true meaning of cybercrime, there is the need to understand the slit meaning of Cyber and Crime. The term “Cyber” is a prefix used to describe an idea as part of the computer and Information age and “Crime” Can be described as any activity that contravenes legal procedure mostly performed by individuals with a criminal motive. Cybercrimes are defined as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones” Such crimes may threaten a nation’s security and financial health Saul .
Cyber crime can simply be explained as crimes carried out with the aid of a computer system. The internet has offered a lot of platform for useful research purposes; However, Cyber crime is a worldwide problem that’s costing countries billions of dollars. According to crime-research.org, as early as 2003 the United States was already leading the world in percentage of cyber attacks at 35.4 percent, followed by South Korea at 12.8 percent. Countries with high rates of computer piracy, such as Russia, have reacted slowly to cyber crime
From the research cyber a crime are performed by people of all ages ranging from young to old, but in most instances the young. Several youth engage in cyber crime with the aim of emerging as the best hacker, or as a profit making venture since the tools for hacking in our modern world has become affordable by many. The interception was done within three months. Some of the instruments uncovered by the UPS were documents like Wal – Mart Money orders,.
Statement of Problem
Ages after the development of computers, human beings have learned to exploit technology productively in computer integrated manufacturing, while others have leaned towards criminal activities. Various scholarly efforts have revealed that there is a relationship between the advancement of contemporary technology and cyber crime. However, the quantifiable aspects of such relationships have not been explored extensively. As such, the question of (how often does a common crime occur because of contemporary technology?) occurs.
Brief History of Cyber Crime:
The first recorded cyber crime took place in the year 1820 although it is the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage .
The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network),.
The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
Categorizing Cyber Crime:
We can categorize Cyber crimes in two ways
The Computer as a Target :-using a computer to attack other computers.
E.g. Hacking, Virus/Worm attacks, DOS attack etc.
E.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
Various Cyber Crimes:
HACKING
Hacking in simple terms means an illegal intrusion into a computer system and/or network. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage.
Motives Behind hacking: Greed, Power, Publicity, Revenge, Adventure, Desire to access forbidden information, Destructive mindset, wants to sell n/w security services.
CYBER STALKING
Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Moreover, cyber-stalking refers to the use of the Internet, e-mail, or other electronic communications device to stalk another person. It is a relatively new form of harassment, unfortunately, rising to alarming levels especially in big cities. It may include false accusations, monitoring, making threats, identity theft, and damage to data or equipment, the solicitation of minors for sex, or gathering information in order to harass.
CYBER TERRORISM
Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
The recent example may be given of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.
CHILD PORNOGRAPHY
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.
Pedophiles use false identity to trap the teenagers Pedophiles contact teens in various chat rooms which are used by teen to interact with other teen befriend the teen. Extract personal information from the child/teen by winning his confidence.
COMPUTER VANDALISM
Damaging or destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate. They usually affect the data on a computer, either by altering or deleting it against properties.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (Virus, worms, Trojan horse, web jacking, e-mail bombing etc).
VIRUS
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term “virus” is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
WORMS
Worms are parasitic computer programs or consellation of programs that replicate itself through the network. Worms can create copies of itself on the same computer, or send the copies to other computers via e-mail or the network. Worms often spread via IRC/Internet and e-mail.
TROJAN HORSE
A Trojan horse is a malicious program that pretends to be a benign application. A Trojan horse is purposefully developed to get access to a computer or otherwise to get information residing on the computer. A Trojan horse program can be just as destructive.
SPOOFING:
A spoofed email is one that appears to originate from one source but actually has been sent from another source (Illegal intrusion, posing as a genuine user).Spoofing means a hacker logs-in to a computer illegally using a different identity than his own. He is able to do this by having previously obtained actual password. He creates a new identity by fooling the computer into thinking he is the genuine system operator. Hacker then takes control of the system.
DENIAL OF SERVICE ATTACK
(DoS Attack) This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. This act is committed by a technique called spoofing and buffer overflow. The criminal spoofs the IP address and flood the network of the victim with repeated requests. Since the IP address is fake, the victim machine keeps waiting for response from the criminal’s machine for each request. This consumes the bandwidth of the network which then fails to serve the legitimate requests and ultimately breaks down.
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original is termed as termed as software piracy. Examples of software piracy. End user copies – Friends loaning disks to each other, or organizations underreporting the number of software installations they have made. Hard disk loading – Hard disk vendor’s loads pirated software. Counterfeiting – large-scale duplication and distribution of illegally copied software. Illegal downloads from the Internet by intrusion, cracking serial numbers etc.
CYBER DEFAMATION
This occurs when defamation takes place with the help of computers and / or the Internet. Cyber Defamation is a crime conducted in cyberspace, usually through the Internet, with the intention of defaming others.
Cyber crime is to a great extent technologically enhanced common crime. Technology has allowed people to lead a much easier and productive life. Similarly, people take advantage of technology loopholes to acquire illegal wealth and restricted information. The question remains: is a contemporary technology more of a nuisance to the processes of ensuring law and order or is it an exploitable strength? With your approval, along with any suggestions, I will continue my research.
Reasons why cyber crime is on increase
Urbanization
Urbanization is one of the reasons for Cyber wrongdoing in many nations it is the monstrous development of individuals from country settlement to Cites. As per the research urbanization is taken a gander at as the enormous physical development of urban territories as an aftereffect of provincial movement in quest for a superior life. This outcome in an overwhelming rivalry amongst the developing masses all the more particularly the elites, accordingly the elites think that it’s lucrative to put resources into the wrongdoing of digital in light of the fact that it is a business that requires less funding to contribute and they are prevalently called “Hurray Boys”. All things considered the elites amongst them think that it’s lucrative to put resources into the digital wrongdoing since it is a business that requires less capital.
Unemployment
Cybercrime can be connected with high rate of unemployment, brutal financial conditions, and poor instructive framework. This plainly uncovers a great deal of young people are not utilized. There is an aphorism that says “an unmoving personality is the fiends workshop”, thusly the vast majority of our childhood will utilize their time and learning as a stage for their criminal action, with a specific end goal to enhance their occupation and to make a decent living.
Mission for Wealth
Another reason for digital wrongdoing is mission for riches; there exist a vast crevice between the rich and the normal, accordingly numerous endeavors to level up utilizing the fastest means conceivable, since for any business to flourish well, the rate of return in the speculation must be developing at a geometric rate with an insignificant danger. Most digital culprits require fewer ventures and a helpful situation.
Lack of proper laws and policies
We have identified that Powerless Implementation of Cyber Crime Laws and Inadequate Equipped Law Agencies. Every legislature must actualize strict laws with respect to digital hoodlums and when criminal offenses happen, culprits must be rebuffed for the wrongdoing they’ve carried out in light of the fact that digital violations lessens the country’s focused edge, inability to indict, digital offenders, can exploit the feeble holes in the current punitive procedures. Sad the country is not all around furnished with modern equipment to find the virtual criminological lawbreakers. It is in this manner vital that the country’s enactment ought to guarantee legitimate usage of their laws against digital wrongdoing.
Negative Role Models
Young people are mirrors of the general public, yet it is very appalling how folks disregard their legitimate obligations. From my research today numerous folks transmits wrongdoing qualities to their wards, through socialization as though it a socio social qualities which should be transmitted to the more youthful era. Envision a circumstance where the kid supplies the father with essential data to wreck individual’s banks account utilizing the PC framework, while the mother mimics the record holder/proprietor at the bank. In the event that this society is guzzled among the more youthful eras the greater part of them will see no wrong in digital wrongdoing hones.
Conclusion
From the all above information its is obviously understood that cyber security is a serious and dangerous issue which can only be tackled by awareness, knowledge and cyber security. It is mandatory not only for franchisors and licensors but also for every other person who uses computers and internet.
For a country to enjoy prolific economic achievement, it must be expanded on a crime free society. In any case, a perfect economy is practically impractical, since as innovation builds so additionally wrongdoing rate. Digital offenders will dependably keep in pace with any innovative headway. Doubtlessly Technology offers ascend to digital wrongdoing. The eventual fate of our economy lies in our grasp, the future itself is the summation of our choices so we ought to have faith in ourselves and try to make the best choice at every point in time, taking after deliberately the recommendations of this paper. Until at that point, the envisioned society won’t turn into a reality
References
Brenner, S. W. (2002).Organized cybercrime-how cyberspace may affect the structure of criminal relationships.NCJL & Tech., 4, 1.
Broadhurst, R. (2006).Developments in the global law enforcement of cyber-crime. Policing: An International Journal of Police Strategies & Management, 29(3), 408-433.
Burden, K., & Palmer, C. (2003). Internet crime: Cyber Crime .A new breed of criminal?. Computer Law & Security Review, 19(3), 222-227.
Choo, K. K. R., Smith, R. G., McCusker, R., & Australian Institute of Criminology. (2007). Future directions in technology-enabled crime: 2007-09. Canberra, Australia: Australian Institute of Criminology.
Dyer-Witheford, N. (1999). Cyber-Marx: Cycles and circuits of struggle in high-technology capitalism. University of Illinois Press.
Hassan, A. B., Funmi, D. L., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the Way Out. ARPN Journal of Science and Technology, 2(7), 626-631.
Hassan, A. B., Funmi, D. L., & Makinde, J. (2012). Cybercrime in Nigeria: Causes, Effects and the Way Out. ARPN Journal of Science and Technology, 2(7), 626-631.
Smith, A. D. (2004). Cybercriminal impacts on online business and consumer confidence. Online Information Review, 28(3), 224-234.