Premium Essay

Cybercrime

In: Computers and Technology

Submitted By 21cschools
Words 7435
Pages 30
Abstract
Information and Communication Technologies (ICT) has become the backbone of many organizations. Particularly, the internet has become an important aspect through which education institutions use to carry out research, communicate and innovate. Even through this evolution has brought many benefits but also it has also brought serious threats such as cyber-attacks that has been demonstrated over the past few years through acts of cyber espionage and cyber-crime through the virtual space. In this context, the University of Dar es Salaam needs to develop policies towards cyber threats even through this has often be clustered and fragmented. Using theoretical and conceptual models this paper provides an informed understanding and critical assessment of the University of Dar es Salaam cyber security policy through addressing the following research questions: What are the IT risk management policy and systems that can be developed for the University of Dar es salaam? The primary data is collected through surveys, and interviews that are open ended and close ended. The results of the paper demonstrated that colleges and universities have been a target for cyber-attacks due to the fact that of the vast amount of computing power they possess, and they provide open access to their constituents and to the public. The research also showed that University of Dar es Salaam doesn’t have a comprehensive IT security risk management policy or guidelines that will guide the business process in the event of an IT security threat. Therefore the University needs to develop policiesthat provide roadmap for effectively protecting the availability, integrity and confidentiality of University of Dar es Salaam Information Systems.

Chapter One Introduction

1. Introduction

Cybercrime is one of the fast growing areas of crime. Accordingly, there have been increased

Similar Documents

Premium Essay

Cybercrime

...Cybercrime There are approximately 40 federal statutes that govern the prosecution of computer-related crimes. Some of the most prominent are the Copyright Act, the National Stolen Property Act, mail and wire fraud statutes, the Electronic Communications Piracy Act, the Communications Decency Act of 1996, the Child Pornography Prevention Act, and the Child Pornography Prevention Act of 1996. Congress recognized computer related computer-related crimes as discrete federal offense with the passage of the counterfeit access device and computer fraud and abuse law in 1984. So as you can see there are quite a few different statutes that apply to computer crime. As for local and state statutes that involve cybercrime there is not too many. In Michigan the terms of cybercrime are these. Mental state must be intentional, misdemeanor if violation involves $200 or less, felony if violation involves more than $1000, attempt is not considered a crime, and civil lawsuits are not permitted. Federal, state, and local statutes apply to the phenomenon of cybercrime by more and more cybercrimes happening and being taken into court proceedings. For example there was a case recently where the US government charged 8 people in a cyber-crime scene that netted close to $45 million dollars in just a few hours. Many of these crimes do not have clearly drawn lines on what charges will be applied to what crime so statutes must be followed to decide the severity of the crime and the punishment....

Words: 255 - Pages: 2

Free Essay

Cybercrime

...Some might say the crime of the 21st century will be white collar. If that is true, what will be the major types of cybercrime? How can we safeguard against it? At the rate technology is evolving, and all the monetary transactions going on, it can create an attraction for thieves. Major types of cybercrime can be anything from illegal betting, to identity theft, or more serious crimes such as human trafficking and child pornography. “to find violators and also propose new legislation to protect law-abiding citizens from cyber-crimes.” There are something we can do to protect ourselves from cybercrime like having anti-spyware, virus protection and malware software, but even with all of that we still might need some help. The government has tried to step up, and protect us but their efforts don’t always lead to a physical person to be punished for their crimes. Cyber bullying is a serious issue in today’s schools and business. If everyone adopted and educated people on netiquette guidelines would this issue be solved? Explain. It may help in a small way, but it will not eliminate the problem, because although we might not like to admit it we tend to be bullies on and off line. If we educate our kids and ourselves on how to behave and treat people well, that might have an impact on other people that are victims of cyber-bullying. It is a serious subject, there has been rumors that teenage kids have committed suicide, as a result from being bullied. “There also have been...

Words: 509 - Pages: 3

Premium Essay

Cybercrime

...Cybercrime Gabriela Peralta and James Walton CJA/204 April 5th, 2015 Robert Quesada Cybercrime The dark side of new technologies, as far as the justice system is concerned, is the potential they create for committing old crimes in new ways or for committing new crimes never before imagined; one of these ways is Cybercrime. Cybercrime is act of crime when using a computer and the Internet. Cybercrime, or computer crime, focuses on the information stored in electronic media, which is why it is sometimes referred to as information technology crime or info crime. This can be anything from downloading illegal music file to stealing money from online bank accounts. Cybercrime can also include non-monetary offenses, such as creating and distributing viruses on other computers or posting business information on the Internet that is meant to be confidential. There is no boundaries or jurisdictions when it comes to cybercrime ŞTEFAN, I. (2011). Below is three known cybercrimes though there are many more cybercrimes in the past and the future these are just a few. This cybercrime is considered being the biggest attack in US history. Five hackers hacked into companies like NASDAQ, Visa Inc., J.C. Penny Co, Jet blue airways Co, and Carrefour SA. They caused over 300 million to these companies. The hackers primarily wanted to steal and sale the 160 credit card numbers they stole from the companies. Authorities say each man had their own role, two hacked networks, another mined...

Words: 1242 - Pages: 5

Premium Essay

Cybercrime

...Cybercrime: The Real Deal Reginald McInnis SEC 402 Information Warfare and Homeland Security Strayer University Spring 2012 Instructor: Professor Scott McCrea In our society there are many different way of communication around the world. With the rapid usage of the Internet and the access of personal computers, we must be aware of the global threats that await the consumer and business it we are not prepared and educated. One of the fastest crime in the United States and all over the world is cybercrime. What is exactly cybercrime? According to the book Scene of the Cybercrime author Michael Cross defines it as a broad and generic term that refers to crimes committed using computers and the Internet, and can generally be defined as a subcategory of computer crime. It can be also said that cybercrime can lead to criminal offenses committed using the internet or another computer network as a tool of the crime (Cross, 2008). According to the Computer Security Institute's Computer Crime and Security Survey for 2007, 494 computer security professionals in the United States corporations, government agencies, universities, and financial medical institutions reported that computer fraud was the greatest source of financial losses, with losses resulting from virus attacks falling into second place for the first time in seven years. In addition to this, 29 percent of the organizations suffered a computer intrusion that they reported to law enforcement (www.gocsi...

Words: 2360 - Pages: 10

Premium Essay

Cybercrimes

...characteristics like being easiest and also quickest way of committing it. In a simple way it can either be defined as a combination of crime and computer. Or any offence or crime in which involved are computers and networks. Origins of Cybercrime combine the term crime with the root cyber from the word cybernetic, from the Greek, kubernân, which means to lead or govern. The cyber environment includes all forms of digital activities, regardless of whether they are conducted through networks and without borders. This extends the previous term computer crime to encompass crimes committed using the Internet, all digital crimes, and crimes involving telecommunications networks. For example, cybercrimes can range from being fraud to unrequested emails (spam). They can also steal both government and corporate secrets by hijacking through official sites. These crimes also involve in stealing huge amounts of money from online bank accounts. Cybercrimes can also indulge in non-money offenses like creating viruses on others computers or posting some confidential information on the internet. (Which at once affected entire world except India as our people doesn’t possess any protection to our computers). In altogether, these cybercrimes can never amount to a single category. As we have them committing in various ways and places. Unlike other countries, cyber Crime is not defined in Information Technology Act 2000 or in the I.T. Amendment Act 2008 or in any other legislation...

Words: 526 - Pages: 3

Free Essay

Cybercrime

...Nowadays, E-commerce is a fundamental part of marketing activity. Most of e-commerce proceeds on the websites of publicly traded companies. A challenge that e-business face is that vulnerably experience e-crime, also known as cybercrime. As Internet technology continues to rise throughout the world, the threat of cyber crime also grows. While some of these crimes are relatively harmless and commonplace, others are very serious and carry with them felony charges. Various types of Cyber crimes that can be encountered over the net are spam, fraud, cyber terrorism and so on. Whether for individuals, companies or governments, cybercrime has become a big problem. Spam is defined as unsolicited junk e-mail. It is used by chain mailers, forger and some others who selling dubious products.  “The Federal Trade Commission (FTC) has identified 12 types of scams that are most likely to arrive in consumers’ e-mail boxes. The “dirty dozen” are: business opportunities, bulk e-mail, work at home schemes, health and diet scams, effortless income, free goods, investment opportunities, cable descrambler kits, guaranteed loans or credit on easy terms, credit repair, and vacation prize promotions”(Phommalinh). Meanwhile, the most common type of cybercrimes occurred in spam is virus which spread by e-mails. When one receive an e-mail with a virus, the default settings of your computer do not have any action required to resist virus. At that point, virus can follow instructions and does anything whatever...

Words: 1173 - Pages: 5

Premium Essay

Cybercrime

...years has led to the increase in new form of crime – cybercrime – throughout the world. Cybercrimes are responsible for the interruption of normal computer functions and have been known to cause the downfall of many companies. This research paper aims to discuss following aspects of cybercrimes: the definition, who they affect and some cybercrime prevention procedures. Broadly speaking, this report will display all necessary information helping people avoid being victims of cybercrimes. Table of contents ABSTRACT 1. Introduction 2. Discussion of findings 2.1. What are cybercrimes? 2.2. What are the effects of cybercrimes? 2.3.1. Potential economic impact 2.3.2. Impact on consumer trust 2.3.3. Impact on national security 2.3. How to prevent cybercrimes? 2. Conclusion REFERENCES 1. Introduction In our modern technology-driven age, keeping our personal information private is becoming more and more difficult. The truth is, highly classified details are becoming more available to public databases because we are more interconnected than ever. This creates a negative stigma that the use of technology is dangerous because practically anyone can access one’s private information for a price. Technology continues to promise to ease our daily lives, however, there are dangers of using technology. One of the main dangers of using technology is cybercrimes. Cybercrimes are any crimes that cause harm to another individuals...

Words: 1762 - Pages: 8

Free Essay

Cybercrime

...Cybercrime With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world. Differences between Cybercrime and Traditional Crime For an individual to fully understand the difference between cybercrime and traditional crime, the individual needs to understand what cybercrime is. The definition of cybercrime is according to "Oxford Dictionaries" (2014), "crime conducted via the internet or some other computer network" (cybercrime). Cybercrime is committed by hackers with the goal of financial gain in min by stealing personal information(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are many different categories for cybercrime but the main four include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are charged on a state law level; however, there are plenty of federal laws that can be violated through committing cybercrime. The main difference that needs to be known is that when cybercrimes are committed, the...

Words: 1128 - Pages: 5

Free Essay

Cybercrime

...They have helped increase productivity and made our lives so much easier. Due to the ease computers have made, it has also opened a door for a new breed of criminal. Cybercrime is on the rise. Cybercriminals use the Internet to spread their viruses, worms, and other hacking tools, like phishing, to steal people’s identity or sign them up for expensive services, which they reap the profits. However, some of these criminals do it for thrill of the chase. According the reading CompCriminal.doc there are two types of cybercriminals, the non-professional hacker and the professional hacker. Another form a cyber-attack called the DoS attack or denial-of-service. “The attack is designed to paralyze websites, financial networks and other computer systems by flooding them with data from outside computers.” (James, 2009). The first document case of a DoS attack was in 2000 by a 15-year old Canadian boy nicknamed “Mafiaboy”. This attack was against several e-commerce sites including eBay.com and Amazon.com. There have been several other hackers prior to “Mafiaboy”. Two of the notorious cybercriminals were Kevin Mitnick and Robert Morris. In 1982, Mitnick broke into the North American Air Defense Command’s computer system. Mitnick was arrested, and convicted for his cybercrimes 1989, which was the first time he was convicted. In 1988, Morris created an Internet worm, which halted almost all Internet activity. He claimed it was an experiment, which...

Words: 1009 - Pages: 5

Premium Essay

Cybercrime

...Case Study – Cybercrime International Centre for Criminal Law Reform and Criminal Justice Policy 1822 East Mall, Vancouver British Columbia, Canada V6T 1Z1 Tel: 1 (604) 822-9875 Fax: 1 (604) 822-9317 Email: icclr@law.ubc.ca www.icclr.law.ubc.ca Case Study – Cybercrime By Annemieke Holthuis Counsel Criminal Law Policy Section Department of Justice Canada Case Study prepared for Co-Teaching at the National Prosecutors College Beijing China November-December 2006 As part of the International Centre for Criminal Law Reform and Criminal Justice Policy (ICCLR) and GeoSpatial SALASAN Programme: The Canada China Procuratorate Reform Cooperation Project, supported by the Canadian International Development Agency 2 Case Study - Cybercrime Public concern about the incidence of child pornography on the Internet is increasing in British Columbia. The police decide to crack down and seek the help of members of the public and Internet Service providers like XYZ Corporation. Brian, a concerned citizen and the divorced father of a young girl, contacts police expressing concerns about his roommate Dwayne. Dwayne is always on the computer and he has no idea what Dwayne is doing. Dwayne’s door is always locked and Dwayne won’t let Brian borrow the computer, even to send a quick e-mail. Lately, Dwayne acts more strangely than ever. Brian said that he didn’t know what it is but he’s no longer comfortable bringing his daughter home when Dwayne was there. Brian mentions...

Words: 7138 - Pages: 29

Premium Essay

Cybercrime

...Abstract Cybercrime is a crime committed on the Internet using the computer as a tool and in some cases a targeted victim. The term “cyber” is a misdemeanor and is not defined (Dashora, 2011). Cybercrime is similar to conventional crime both include acts and commissions that are a breach of law counterbalanced by sanctions from the state. Cybercrime is the latest and most complicated problem in the cyber- world. Illegal methods of cybercrime are financial crimes, pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber-defamation, and cyber- stalking (Dashora, 2008). Cyber-Crimes and the Advancement of Technology In modern day, the economy is doing poorly and unemployment rates are at its highest. Individuals are struggling to obtain a job that pays well. It is sad to know that criminals are taking advantage of other individuals but these criminals never think about how they are hurting others by what they do. Cyber-crimes have become so popular in other countries and money laundering is a type of cyber-crime that has become a huge issue over the years. Today’s technology has made it easier for criminals to commit cyber-crimes because he or she does not have to expose his or her face because of the Internet. The new trend is for scammers to solicit through e-mails about job offers to trick individuals into falling for payment transfer scams (Hoax-Slayer, 2012). The recipient does not notice that he or she has committed a money laundering...

Words: 340 - Pages: 2

Premium Essay

Cybercrime

...Cyber Crime has become a top priority for law enforcement on a local, state and federal level. We are becoming increasingly concerned about cyber threats, most particularly on computer intrusions and network attacks. Computer intrusions are becoming more commonplace, more dangerous and more sophisticated. Our nation’s critical infrastructure and our military’s command and control networks are most certainly being targeted by our enemies and other potential adversaries alike. Our companies are being targeted for insider information and our colleges and universities for their valuable research and development. All of that being said, cyber crime is hitting us at home as we are being targeted for fraud and identity theft and our children are often targeted by online predators. No one is immune to these cyber risks, individuals, countries, Fortune 500 companies and the neighborhood “Mom and Pop” store. These threats are evolving and expanding every day. It is important to be wary and safeguard information and cyber access by these fraudsters and predators. I am using the law enforcement perspective, one I am most familiar with, in this paper. Computer intrusions and network attacks can affect many different facets of national security and organizational information. It is clear that terrorists and their organizations are using the internet to recruit and maintain their strength. For example, in the Arabian Peninsula, Al Qaeda has produced a full-color, English language...

Words: 873 - Pages: 4

Premium Essay

Cybercrime

...Measuring the Cost of Cybercrime Ross Anderson 1 Chris Barton 2 Rainer B¨hme 3 o Richard Clayton 4 Michel J.G. van Eeten 5 Michael Levi 6 Tyler Moore 7 Stefan Savage 8 Abstract In this paper we present what we believe to be the first systematic study of the costs of cybercrime. It was prepared in response to a request from the UK Ministry of Defence following scepticism that previous studies had hyped the problem. For each of the main categories of cybercrime we set out what is and is not known of the direct costs, indirect costs and defence costs – both to the UK and to the world as a whole. We distinguish carefully between traditional crimes that are now ‘cyber’ because they are conducted online (such as tax and welfare fraud); transitional crimes whose modus operandi has changed substantially as a result of the move online (such as credit card fraud); new crimes that owe their existence to the Internet; and what we might call platform crimes such as the provision of botnets which facilitate other crimes rather than being used to extract money from victims directly. As far as direct costs are concerned, we find that traditional offences such as tax and welfare fraud cost the typical citizen in the low hundreds of pounds/Euros/dollars a year; transitional frauds cost a few pounds/Euros/dollars; while the new computer crimes cost in the tens of pence/cents. However, the indirect costs and defence costs are much higher for transitional and new crimes. For the former they may be...

Words: 16972 - Pages: 68

Free Essay

Cybercrime

...Since the early 1990s, the internet has grown technologically faster and with more capabilities than any other type of technology in the world, leaving the United State with a sense of fear with this type of network being a risk to our national security. While most of us find the internet to be a great tool of information, and unlimited capabilities, it can devastate us personally and financially. The internet can increase the risk of theft, fraud and even the possibility to suffer from a cyber-attack or even worse a cyber-terrorism, leaving our country at risk especially for those who work in the government defense agencies and private corporations. In 2003, the conflict with Iraq created a round of speculations that the United States was going to experience cyber-attacks in revenge (Clarke). But, since 1995 there haven’t been any reports of cyber-attacks that would produce panic or damage to U.S. infrastructure or that affects our military operations. By any means this is not a result of idleness by terrorist groups. Between 1996 and the end of 2001 there was 1,813 international terrorist attacks performed. To mention a few that involved citizen targets, there is the Khobar Tower Bombing in June 1996, the Embassy Bombing in East Africa in August 1998, and the USS Cole attack in October 2000. Between 1996 and 2003, to compare between terrorist attacks around 1,813, computer security incidents around 217,394 and cyber-attacks on infrastructure which they were 0, reporters have...

Words: 2224 - Pages: 9

Free Essay

Cybercrime

...Baggili & Rogers - Self-reported cyber crime: An analysis on the effects of anonymity and pre-employment integrity Copyright © 2009 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 July - December 2009, Vol 3 (2): 550–565 This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity Ibrahim Baggili 1 Zayed University, United Arab Emirates (UAE) Marcus Rogers 2 Purdue University, West Lafayette, USA Abstract A key issue facing today’s society is the increase in cyber crimes. Cyber crimes pose threats to nations, organizations and individuals across the globe. Much of the research in cyber crime has risen from computer science-centric programs, and little experimental research has been performed on the psychology of cyber crime. This has caused a knowledge gap in the study of cyber crime. To this end, this research focuses on understanding psychological concepts related to cyber crime. Through an experimental design, participants were randomly assigned to three groups with varying degrees of anonymity. After each treatment, participants...

Words: 6388 - Pages: 26