The Cyberspace Crime!

viewgreenStarred Page By viewgreen, 20th Jan 2015 | Follow this author | RSS Feed
Posted in Wikinut>Reviews>Technology>Components

If you are a person familiar with the term of computer crime, of course you should to know that what cyber crime is. For many people that the word of cyber crime may also sound familiar and less know what the purpose of cyber crime?

Cyber Crimes Definitions

Cyber crime is a term that refers to the activity of the crimes committed in the virtual world using a computer or computer network technology or Cyber-crime is defined as a crime in which a computer is the object of the crime (hacking, phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes). Cyber-criminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitative or malicious purposes. Criminals can also use computers for communication and document or data storage. Criminals who perform these illegal activities are often referred to as hackers. And then Cyber-crime may also be referred to as computer crime.

Cyber Crime Categories

Common types of cyber-crime include online bank information theft, identity theft, online predatory crimes and unauthorized computer access. More serious crimes like cyber-terrorism are also of significant concern.
Cyber-crime encompasses a wide range of activities, but these can generally be broken into two categories:

  • Crimes that target computer networks or devices. These types of crimes include viruses and denial-of-service (DoS) attacks.

  • Crimes that use computer networks to advance other criminal activities. These types of crimes include Cyber-stalking, phishing and fraud or identity theft.
  • Here an example video of Cyber-crime act:

The FBI identifies cyber-crime fugitives who have allegedly committed bank fraud and trafficked counterfeit devices that access personal electronic information. The FBI also provides information on how to report cyber-crimes, as well as useful intelligence information about the latest cyber-criminals.

Computer Viruses

Computer viruses are computer programs that, when opened, put copies of themselves into other computers' hard drives without the users' consent. Creating a computer virus and disseminating it is a cyber crime. The virus may steal disk space, access personal information, ruin data on the computer or send information out to the other computer user's personal contacts. The most common way for a virus to infect a computer is by way of an email attachment. An example would be if you received an email with an attachment. You open this attachment, and the virus immediately spreads through your computer system. In some cases, if the virus is opened by a computer on a system network, such as your place of employment, the virus can immediately be spread throughout the network without needing to be sent via email.
There are numerous reasons that a person would create a virus to send out to another computers. It may be to steal information or money, to sabotage that system or to demonstrate the flaws that the other computer system has. In some cases these viruses are able to be removed from the user's computer system, and in some cases they are not. Therefore, it is easy for us to understand how these viruses cause significant financial harm every year. The punishment for those who damage or gain unauthorized access to a protected computer can be prison time and the repayment of financial losses.

The Cyberstalking & the Identity of Theft

  • Cyber-stalking: Cyber-stalking is the use of the Internet or electronics to stalk or harass an individual, an organization or a specific group. There are many ways in which cyber-stalking becomes a cyber crime. Cyber-stalking can include monitoring someone's activity real-time, or while on the computer or device in the current moment, or while they are offline, or not on the computer or electronic device. Cyber-stalking becomes a crime because of the repeated threatening, harassing or monitoring of someone with whom the stalker has, or no longer has, a relationship.Cyber-stalking can include harassment of the victim, the obtaining of financial information of the victim or threatening the victim in order to frighten them.
  • An example of cyber-stalking would be to put a recording or monitoring device on a victim's computer or smartphone in order to save every keystroke they make so that the stalker can obtain information. Another example would be repeatedly posting derogatory or personal information about a victim on web pages or social media despite being warned not to do so. Cyber-stalking has the potential punishment of a prison sentence. Here is a video of Cyber-stalking:

  • Identity Theft: Identity theft is a form of stealing someone's personal information and pretending to be that person in order to obtain financial resources or other benefits in that person's name without their consent. Identity theft is considered a cyber crime. The personal information stolen can include the person's name, social security number, birth date or credit card numbers. This stolen information is then used to obtain new credit cards, access bank accounts or obtain other benefits, such as a driver's license.
  • Identity theft is completed by using breaches in the victim's browser security or through spyware, which is software placed unknowingly on a person's computer in order to obtain information. Identity theft can also be performed by hacking into computer networks to obtain personal data - sometimes in large amounts.
    For example, an individual could get your password and obtain your personal information that you entered into Amazon when you made a purchase in the past. He could then use your birth date and social security number in order to apply for a new driver's license in your name with his picture on it! Identity theft is punishable by a prison sanction.

The Ways to Avoid Pitfalls Phishing on the Internet

The powerful ways to avoid pitfalls phishing on the Internet that it can not be denied again, the internet can make our lives easier. However, Internet users (Netter) still need to be careful and vigilant, because criminals also scattered in cyberspace.
One form of fraud on the Internet is to trap called phishing. Phishing is an attempt to get financial or personal information of Internet users, which usually starts from an email that looks like it came from the original source, especially financial institutions.
This fraudulent email contains a link to a fake website that is similar to the original website link. The fraudsters cyberspace wants your account information and password, which can be used to access the victim's account.

  • Privacy Settings
  • You should always check the privacy settings while opening accounts in social media, like Facebook and Twitter. By default privacy settings can make your information is widespread in the online community. To overcome this, you must modify the settings if it is felt necessary. This is done prior to posting information on social media.

  • Information Biography
  • Many social media websites require biography information to create an account. You can restrict the information to other users of social media. In addition, you can also adjust your privacy settings to minimize people who can see your biographical information on the website.

  • Account Information
  • Never give important information such as account numbers or financial related to social media. If you want to talk about important things should be done in a straightforward manner. Suppose you want to speak with a financial expert, you should use a more formal method of communication such as telephone, mail, or email a company.

  • Limit Contacts or Friends
  • When choosing friends or contacts in social media, you should first think about the reasons you use the website. You do not have to be friends with everyone in the social media. Therefore, you must determine whether it should accept a friend request from a friend or financial service providers (Finance). You do not need to accept friend requests from people you do not know or is magnified unknown.

  • Recognize Features
  • When using social media, you should understand the features and functions that exist in it. This should be considered before you spread the message on the website. One of these restrictions messaging features. You should really consider about who can see your messages, whether for a few friends or to all of them.

So, of course there are many more cases of crime with cyber-crime can happen in cyberspace, with the use of computer technology and the Internet network cyber actors can perform impersonation or infiltrate a system they set as a target, cyber actors could have created a variety of computer malware to various evil purposes.

Thank you very much for your visiting to read this page. Wish you all have a good day! :)

CYBER-CRIMES - ©2015| viewgreen for the Wikinut - Unique Contents.
Images Credit^

Become a WIKINUT - it's free to JOIN Here!!!
WRITE, SHARE & EARN!!!

Tags

Computer, Computer Network, Computer Programs, Computer Security, Computer Technology, Cybercrime, Cyberspace, Cyberstalking, Hack Personal Information, Hacking, Internet, Internet Security, Password Hack, Phishing, Spammers, Viruses

Meet the author

author avatar viewgreen
A CS engineer who loves to write about TI (Innovations), Socials, Cultures & Heritage (Local Wisdom), Humors and others that I am eager and interested to. Thank you! :D

Share this page

moderator Mark Gordon Brown moderated this page.
If you have any complaints about this content, please let us know

Comments

author avatar viewgreen
20th Jan 2015 (#)

Dear sir! Thank you very much for authorization to publish this page. Have a nice day! cc: (Mark Gordon Brown)

Reply to this comment

author avatar pohtiongho
20th Jan 2015 (#)

Viewgreen: Thanks for the info. Hiding behind their pseudonyms these ruthless and tyrannical assholes use the internet to denigrate others and even other religions. We simply ignore them and continue writing. To retain your sanity, you just have to keep on writing and ignore these blood-thirsty assholes.

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Comments are exceptional, it is true that the scrim is a term that is always addressed to the hackers and their pseudonyms usually better known as Anonymous. Quoting from several sources regarding the motivation of hackers characteristics are following:
** Who is Anonymous? We were driving on the freeway next to you. We flew from one country to another. We are everywhere.
** Some say, Anonymous has died, but I always say, Anonymous is just a word, we all always Anonymous.
Approximately so!
Thank you very much for a great comment on this page.

Reply to this comment

author avatar n.c.radomes
20th Jan 2015 (#)

Thanks for these vital information Theyll help us avoid or ignore them.

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Sure, that's depend on our self. Thank you for sir for coming to read this page. cc: (n.c.radomes)

Reply to this comment

author avatar Nancy Czerwinski
20th Jan 2015 (#)

Thank you so much for sharing these great tips with us. Smiles to you today and always.

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

So, do you my friend Nancy! And thank you for coming to see this page. Have great days to you. :)

Reply to this comment

author avatar M G Singh
20th Jan 2015 (#)

This is a new field. Great post

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Exactly. You could say this is a new field, but without us knowing hackers scattered everywhere. and it's likely to have occurred in all of us herein. Hopefully not!
Thank you sir. cc: (Madan G Singh)

Reply to this comment

author avatar GenkiWorld
20th Jan 2015 (#)

great article, you touched on every key point of this very important subject. these days we should be safer online than ever and have eyes everywhere to prevent anything from happening to us on the internet.

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Exactly, basically the hackers often attack to the people who do not know what is a crime in cyberspace, although many people are already know about, but it could be that they have been victims or they may be targeted because it is a mission of which they were couplet contained in a sentence like:
"As long as we still have a keyboard warrior and command on the internet. We are invincible! As quoted from: Anonymous!
Thank you very much for a great comment on this page madam. cc: GenkiWorld.

Reply to this comment

author avatar Shamarie
20th Jan 2015 (#)

Great article, Viewgreen, and congrats on the star page! Cyberspace crime is a serious crime in the 21st century and hopefully it can end soon. Thanks for sharing!

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Thank you my friend shamarie! you are correct that the crime in cyberspace is a serious thing in this century. Moreover, they often appear on behalf of the organization related to criminal or terrorist acts. The point is back to each of us be careful in cyberspace, especially to financial online transactions. Thank you!

Reply to this comment

author avatar Fern Mc Costigan
20th Jan 2015 (#)

nowadays you have to beware of hackers and cyber bullies, in the street you can defend from thieves in the net good luck regardless of the antivirus you have, good post!

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Well, that's right my friend fern! basically we have to be careful and vigilant against their activities (Hackers).
Thank you for sir for coming to read this page. :)

Reply to this comment

author avatar Mccart
21st Jan 2015 (#)


Am here to testify what this great spell caster done for me. i never believe in spell casting, until when i was was tempted to try it. i and my husband have been having a lot of problem living together, he will always not make me happy because he have fallen in love with another lady outside our relationship, i tried my best to make sure that my husband leave this woman but the more i talk to him the more he makes me fell sad, so my marriage is now leading to divorce because he no longer gives me attention. so with all this pain and agony, i decided to contact this spell caster to see if things can work out between me and my husband again. this spell caster who was a woman told me that my husband is really under a great spell that he have been charm by some magic, so she told me that she was going to make all things normal back. she did the spell on my husband and after 5 days my husband changed completely he even apologize with the way he treated me that he was not him self, i really thank this woman her name is Dr Aluta she have bring back my husband back to me i want you all to contact her who are having any problem related to marriage issue and relationship problem she will solve it for you. her email is traditionalspellhospital@gmail.com she is a woman and she is great. wish you good time.
He cast spells for different purposes like
(1) If you want your ex back.
(2) if you always have bad dream
(3) You want to be promoted in your office.
(4) You want women/men to run after you.
(5) If you want a child.
(6) You want to be rich.
(7) You want to tie your husband/wife to be yours forever.
(8) If you need financial assistance.
(9) HIV/AIDS CURE
Contact him today on: traditionalspellhospital@gmail.com

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

You know.... The activities of a SPAMMER more cunning than a Hacker! >> ~ to: Mccart.

Reply to this comment

author avatar Carol Roach
21st Jan 2015 (#)

well done there are so many different kinds of cyber crime these days. Many people have become victims

Reply to this comment

author avatar viewgreen
21st Jan 2015 (#)

Absolutely, it's very aptly your comment in.
Thank you for stopping here to read this page madam. :)

Reply to this comment

author avatar zoel
23rd Jan 2015 (#)

the criminal is everywhere then the hackers act is a part of. It is so sparkle topic you write. thanks.

Reply to this comment

author avatar Gclick
12th Feb 2015 (#)

Hi, man! you have some awesome information which have been ever sharing here. those are interesting some. thanks for sharing.

Reply to this comment

author avatar Colekdikit
13th Feb 2015 (#)

Carding, hacker & Cracker are the cyber crime communities. good article. thanks

Reply to this comment

author avatar Geeta Rao
19th Mar 2015 (#)

Very informative thanks 4 the share I got 2 learn many things from ur writeup.

Reply to this comment

Add a comment
Username
Can't login?
Password