Monday, May 27, 2019

Cyber Crime in the 21st century Essay

Examine the key features around the growth, development and policing of cyber wickedness in the 21st century.The internet was first created in the 1960s, but it only in reality started to take off and develop in the last 20 years with big websites such as Google (1998) and YouTube (2005). With the internet developing and mint knowing more than about it, cyber iniquity then came about and since then it has grown and gotten more dangerous and more extreme.There argon several different types of cybercrime for example one is called cyber violence, this includes stem and harassment, it can also be bullying people online via social networking sites and chat rooms. Cyber obscenity is another type of cyber crime which is sexual including porn sites. Cyber trespass is the crime of hacking sites and cyber theft is also another cybercrime which is credit card fraud as well as the illegal downloading of movies, music, books etc.Computer hackers are actually intelligent, initially they st arted hacking sites simply because they were able to, and they wanted to explore the sites, at the start it was done just for fun. However it didnt take long for these hackers to realise their potential and what they could really be doing, soon it then escalated and they became more educated and more confident in hacking. These hackers could now be described as attackers.There are a few types of attacks that can be made on a computer. One is Denial of Service (DoS) attacks. This is a system set up which sends out a fake email to an individual, it could be to check their password for online banking or make credit card payments etc. It will look very genuine to helper users and often many of them fall into the trap. E-Mail bomb is another type of attack that can be made, hundreds of emails are sent to a service in order to shut it down. Another attack is a Trojan Horse, these are attachments sent to people perhaps through email, they may also pop up on the screen. They are very appe aling to individuals for example click here for your free iPad or you are the 999,999th visitor, click here to claim your free abide by these are likely to open up viruses. Other types of attacks include Worms, Network Scanning and Key Loggers. Argot is a type of language used for hacking sites and cognize by all highly skilled hackers.There are three different types of hackers they are Black hat hacker, white hat hacker and grizzly hat hacker.1. Black hat hacker they are dangerous and highly skilled hackers. They will make it known to people how good they are at hacking and how dangerous they are.2. White hat hacker they are usually employed by companies to test the security of their websites.3. Grey hat hacker they are very unpredictable and because of this it makes them the most dangerous of all three hackers.Many big website have been hacked such as Yahoo and Play, this is not well known because companies have-to doe with do not want the news to be usualised mostly becau se it would not be good for business as people may conceive of that the website is not safe and will not use it. 22% of the top mobile applications have been hacked.Stalking only became a crime in 1997 and a criminal offence in England and Wales in 2012. Cyber angry walk activities include sending repeated, unwanted messages, it could be ordering stuff on behalf of the victims, publicising the victims personal information, spreading put on information about the individual and encouraging others to harass the victim. There are 2 types of stalking, direct and indirect. Direct is most common and often starts with an email. Indirect is stalking with the use of billboards and advertisements. In 1999, Ellison carried out research on Working to the Halt of Abuse Online 2000 and found that 39% of stalkers began contact with the victim via email.Only 1% of stalkers didnt use the internet to first get in contact with the victim. Stalkers are likely to be an ex-partner, however half of all stalkers arent known by the victim. There were websites set up for people to stalk there ex partner online, they were called Avengers Den and Get Revenge On Your Ex they were designed so people could crush their ex-partners self esteem and they could fake SMS them. 87% of cyber stalking victims are young women (Working to the Halt of Abuse Online). Only 50% of cyber stalking activities are reported to the authorities.There are three groups of cyber stalkers Simple Obsessional, these stalkers have been in a relationship with the victim, the victim has tried to call it of but the stalker refuses to support it and becomes obsessed with the victim. Love Obsessional, these are stalkers who havent had a relationship with the victim but they bank that themselves and the victim have a special connection. Erotomaniac stalkers believe that the victim is deeply in love with them, it can be messages through the media that lead them to believe this. (Melroy, 1996 Mullen et al., 1999)Cybercrime violence has links with terrorism. Cyber terrorism is when an attack is made against a person or property. Cyber terrorism can even be causing a person to be fearful of being harmed. Al Qaeda which is an worldwide terrorist organisation which began in the late 1980s has been on the internet from the late 1990s. These Al Qaeda sites may only be on the web for a matter of hours before they are shut down, however they are soon replaced by another one. There were an estimated 5,600 sites as of January 2008 and 900 appearing each year (Weimann 2008).Policing Cyber villainyCybercrime has no limits and it can be uncontrollable, there are so many crimes committed online it is hard to keep track of all them. Also it is difficult to pull in a pattern in cybercrimes.Cybercrime is still developing, there are more viruses every day, it is the fastest moving type of crime. This may be because many people may be committing cyber crime without knowing it, for example people may not know when th ey are downloading music illegally. Cyber crime is growing and growing. The internets characteristics make cybercrime policing very hard, especially hackers, they are so skilled and make sure they do not get caught. There are state funded public police organisations set up to help police cybercrime and put a stop to it. There are also state funded non police and non public policing organisations. ISPs are set up as well as internet users forming groups to protect themselves from cybercrime.There are specialist units in place for policing cybercrime for example Europol which is the European police enforcement agency and Interpol which is the worlds largest policing agency with 109 countries involved. They connect policing communities to make the world safer. Forensic Investigation Units, CID/ Fraud Squad, Computer crime units and child protection units are specialist units that deal with cyber crime. The aim for the future is to bring in some form of legislation that cuts down on cy ber crime and also to stop cyber crime from starting in the first place.To conclude the internet has proven to be very dangerous and cyber crime is developing rapidly. People have to be exceedingly careful while using the internet and not fall into the hackers trap.Warren, P and Streeter, M (2005). Cyber Crime. London Vision Paperbacks. 1-19, 19-45, 45-72.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.