Verified Document

Case Study Of Cyber Crime Essay

Cyber Crimes There are many different types of cybercrime committed. The general class of cybercrime reflects any crime that occurs over the Internet. These can range from hacking crimes to identity theft, and anybody or any entity that is online can be vulnerable to cybercrime. The list of ten major cybercrimes covers a wide range of crime types and victim types, highlighting the diverse range of criminal activity that falls under the category of cybercrime.

One of the cases identified in the video was that of Max Vision, a hacker who stole credit card information. Max Vision stole over two million credit card numbers, and was sentenced to a record 13-year sentence for this crime in 2010 (Poulsen, 2010). He had sold the stolen numbers to other criminals, and they racked up $86.4 million in fraudulent charges.

Vision was a cyber security consultant in the late 1990s, and was one of the leaders in the field. He was hacking on the side, however, and eventually this led to the credit card hack. He had already been to prison in 2001 for one hacking incident, where he had closed security holes in the Pentagon security systems, but left other holes of his own making...

In prison, Vision met a number of other criminals, one of whom would become his partner in the credit card venture. The scam began with stealing credit card numbers, creating fake cards, and using them to buy luxury merchandise, which was then sold on eBay.
He staged a takeover of the online market for stolen credit card data, and at one point discovered that one of the members of this market was logging in from an FBI office. However, the hacking community dismissed his claims, and the FBI continued to work its undercover operation. Vision was arrested with five terabytes worth of encrypted data, and it took a team of software engineers some time to crack his codes and access this data.

The hacks had a high economic value, which were basically losses to the credit card companies, in particular CapitalOne. Vision's history as an offender, and his domination of this credit card market, were factors in making this such a notorious case. His sentence was a record at the time, though certain hacking offenses can result in life sentences. He had, however, worked with authorities in order to help after his arrest,…

Sources used in this document:
References

"10 Notorious cyber crimes" (2014). Alltime 10s./YouTube. Retrieved March 17, 2016 from https://www.youtube.com/watch?v=m0iaRn2WwPw

Poulsen, K. (2010). Record 13-year sentence for Max Vision. Wired. Retrieved March 17, 2016 from http://www.wired.com/2010/02/max-vision-sentencing/
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber-Crime, Cyber-Terrorism, and Cyber-Warfare Since
Words: 2784 Length: 10 Document Type: Research Paper

Contemporary Cyber-warfare Cases Studies In 2011, the Center for Strategic and International Studies published Significant Cyber Incidents Since 2006 (Lewis, 2011) as part of its Cyber and Internet Policy, Technology and Public Policy Program. Among the incidents detailed in that report, referenced by their year of occurrence: 2007 After officials in former-Soviet Estonia removed a World War II memorial from its capital city of Tallinn in the Spring of 2007, a large-scale cyber-attack

Cyber Crime and Corporate Security Insights
Words: 5089 Length: 17 Document Type: Research Paper

CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past

Cybercrime Modern Scam: A Summary of the
Words: 1182 Length: 4 Document Type: Article Review

Cybercrime Modern Scam: A Summary of the Seven Most Threatening Scams of our Generation Intended Audience Cybercrime: Cybercrime is a serious threat to continued use and reliance on the internet. From bank accounts, to e-mail addresses and a myriad of password, if one is not careful, identity theft, account break-in, and other such cybercrimes can happen very quickly, and with incredibly negative repercussions. This paper will aim to summarize the study "The Seven Scam Types:

Cyber Crime Malicious Activities Like Identity Theft,
Words: 2334 Length: 7 Document Type: Term Paper

Cyber Crime Malicious activities like identity theft, harassment and phishing activities are conducted by the cyber criminals by making use of the anonymous context of the cyber world to their advantage. Phishing scams are conducted in such a manner by the scammers that websites are created by them and emails are sent out in order to trick the account holders into revealing sensitive information like passwords and account numbers. These crimes

Cybercrime Is a Concept That
Words: 3003 Length: 10 Document Type: Essay

Most of these systems should be programmed to prompt for username and password in order grant access. This is therefore a way of providing verification to the user. The passwords should be changed regularly in order to make the system more secure. The password should comprise of very hard- to- guess alpha numeric characters Organizational techniques of prevention In order to combat cyber crime, various governments and organizations should come up with special

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now