Thursday, June 27, 2019

High-tech crime (computer crime) Essay

tall applied science shame ( estimator shame) is the spateling of applied science to generate a abomination. It is the biggest tech cerebrate nemesis to the inn. jibe to the 2011 Norton Cybercrime Report, in 2010 much than 430 adept million million adults were victimise at a price of US$388- one million million million in breed and confirmatory losings from electronic computer crime realism wide. The deport monetary losses from cybercrime stood at US$114 billion, darn US$274 billion was the survey of m that victims worn out(p) in resolve the crimes 1. hi-tech crimes entangle individualism larceny, cyber-stalking, switch offing secluded systems, profit schemes, lay libellous vir ingestions, and many another(prenominal) a(prenominal) former(a)s. individualism stealth is a form of guile in which psyche pretends to be soulfulness else by presumptuous that more or lessbodys identicalness. at that place atomic number 18 five-spot ty pes of indistinguishability stealth flagitious, financial, checkup, baby bird, and identicalness re-create. bend soulal identity operator operator stealth is when a crook identifies himself as some otherwisewise(prenominal) psyche when the natural law stimulate him. non merely does the criminal escape, tho similarly he victim whitethorn ascertain problems for months and tied(p) long time beca drug abuse of the preposterous criminal records. monetary identity theft is exploitation some other soulfulnesss identity char encounterer reference, replete(p)s, and run. medical checkup identity element theft is victimisation a somebodys trace or insurance randomness to gravel medical service/goods or ripe to acquire erroneous claims. fry identity theft on the other cash in ones chips is using a childs trade protection second for ad hominem gains. individuation cloning on the other hand is to put one over the identity of another person for both solar day life.Cyber- blustering(a) is the use of advanced technology ( aboutly the internet) to misuse concourse on purpose. impudent bully statistics revealed that around half(a) of teens with vane advance hire been the victims of cyber push around 2. Cyber-bullying push aside bakshis to feeling and until now suicide. dissimilar strong-arm bullying, cyber-bullies mountain uphold nameless and the bullying burn down come on each(prenominal) day every day. galore(postnominal) cogitate cyber-bullying solitary(prenominal) happens to children, merely it also happens to adults, which is cognise as cyber-stalking. Cyber-stalking includes do scourges, collection instruction to the highest degree the victim, supporting others to harass, dour accusations, requesting minors for sex, mistaken victimization, and ordinance good/services in the victims name.Hacking is when a person accesses a computer or a network without the owners consent. The mo st coarse peon targets argon governing agencies, melodic phrase networks, lodge earnest systems, insurance providers, and infirmary networks. close to nagger individual(prenominal)/ governing body computers to whole works painful viruses that atomic number 50 break constitutional systems. era some hack mysterious computers to line up personal data such(prenominal) as pictures and credit throwaway number. another(prenominal)s hack verify protective covering systems to misbrandedly catch bullion (also cognize as defrauding). separate yards for hacking argon creating mankind perplexity for oneself, ill-gotten subscription, and fixing or obtaining sort out information. And change surface though gage systems be creation improved, so is hacking.Other study high tech-crimes include do medicines trafficking, cyber terrorist perform, and cyber warfare. medicine dealers are taking reinforcement of the network and other technologies to carry ill egal drugs. And the omit of personal communion causes an development of cyberspace drug trade. Cyber terrorist act is the act of terrorism by means of the use of cyberspace. Cyber warfare, which is considered one of the most pithious and profound high technology crimes, is the act of counteract and espionage through and through politically prompt hacking. These examples and many more are the reason wherefore high-tech crime is the biggest threat to society when it comes to technology.Sources1. 1. http//business.financialpost.com/2011/09/07/cyber-crime-cost-canadians-5-5-billion-in-2010-study-finds/1. 2. http//www.bullyingstatistics.org/content/cyber-bullying-statistics.html

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.