Cyber Crime: An Overview
An insight into the different aspects of cyber crime including a definition, a short history, a few famous and important cases and ideas to curtail it.
# 27707 | 2,869 words | 7 sources | MLA | 2003 |
Published on Jun 16, 2003 in Computer and Technology (Technology) , Criminology (Criminal Justice and Corrections)
$19.95 Buy and instantly download this paper now
This paper discusses cyber crime, criminal activity which targets computers and information, or which uses computers as the means of committing an offense. It examines how it is a very serious and complicated matter that cannot be taken lightly and how without a true understanding, public and private corporations can easily be mislead in the perspective of its gravity. It shows how this thinking opens up weaknesses in public and private computer systems that the cyber criminal could easily take advantage of and exploit for their own gain. It defines cyber crime, breaking it down into a number of sections giving examples of certain crimes that are often committed under each section. Then it provides a brief history describing the development of new laws for the new crimes, specific cases in history concerning cyber crime and also a description of where cyber crime is today and its impact on the individual and companies who are its victims.
From the Paper:"Just like the world of street crime the world of cyber crime needs policing tactics and policing units. Yet the goal of the agencies are not really to prevent, but more to investigate crimes that have already happened; the reason for this is because in cyber space there is no physical area where police can patrol to stop crime. So if policing agencies cannot prevent attacks, not including the use of undercover online operations, then who can? This question can be answered in a few ways. Private companies usually hire experts in the field of computers who can find the companies? weaknesses and where they could be attacked and tighten up their network with certain defenses like firewalls, virus scanners, and other various programs. The individual, on the other hand, has to spend money on programs which will detect intrusions and viruses that have infiltrated their personal system. Private industries that create these programs which protect systems would be similar to companies who produce self-defense equipment and classes, because that is what these programs do; they target-harden and help a victim fight back against their attacker."
Cite this Essay:
Cyber Crime: An Overview (2003, June 16) Retrieved May 08, 2021, from https://www.academon.com/essay/cyber-crime-an-overview-27707/
"Cyber Crime: An Overview" 16 June 2003. Web. 08 May. 2021. <https://www.academon.com/essay/cyber-crime-an-overview-27707/>