Verified Document

Cyber Crime A Rising Problem Research Paper

Cyber Crime: Threats and Preventive Measures / Cyber Crime: A Rising Problem Methods Used to Commit Cyber Crime

Methods Used to prevent Cyber Crime

The area of cybercrime is growing rapidly. An increasing number of criminal-minded individuals are taking advantage of the unrecognizability, speed, and convenience offered by the Internet, for perpetrating a variety of crimes, which know no bounds, either virtual or physical, causing grave harm and posing very real risks to victims across the globe. New cybercrime trends crop up every now and again, costing the world economy several billion dollars. Earlier, cybercrime was largely perpetrated by small groups or individuals. Of late, however, the world is witnessing extremely advanced cybercriminal networks that combine real-time efforts of individuals from all over the world to perpetrate web-based offenses on an extraordinary scale (Sundaram & Umarhathab, 2011).

Methods Used to Commit Cyber Crime

Criminal groups increasingly resort to the World Wide Web for facilitating their criminal activities and maximizing profits as early as possible. While the crimes aren't essentially new (fraud, theft, illegal gambling), they are developing consistent with online opportunities, and thus, are becoming more harmful and extensive. Fraud cases, for instance, range from stolen details of bank accounts to unwitting individuals voluntarily releasing money to cover expenses for lotteries they have supposedly 'won'. Scam emails in increasing numbers bombard every possible account, providing...

In view of the economic slump, society is seeking means to procure extra money to get by. Cyber criminals make the most of this crisis by establishing advance-fee credit programs, marketing a guaranteed loan or credit line after an upfront charge is paid. A detailed review of cybercrime methods is given below.
Lottery Fraud

This form of cybercrime constitutes only one of various forms of advance-fee scams, where criminals try to coax potential victims into paying advance fees or fairly small amounts of cash for any service they haven't sought. In lottery scams, perpetrators demand for money to be disbursed in order to receive a tremendous lottery. Quite often, the names of well-known institutions or corporations are cited for lending an impression of credibility to the lottery claim. Common media utilized by these scammers are cell phones, the Internet, and mobile devices (Interpol, 2015).

Scam Emails

Another name for this form of crime is 'phishing'. In a majority of cases, phishers dispatch spam emails to millions of email accounts. Each email comprises of what seems to be from a trusted, popular company. At times, recipients are directed via a link in the email to some spoofed web page. Just like the email, the site also appears to be genuine; in some cases, the site's URL is masked for the address to appear real. These sham websites encourage visitors to key in confidential information -- bank account numbers, social security numbers (SSNs), passwords, etc. Making…

Sources used in this document:
References

Interpol. (2015). Connecting Police for a Safer World. Retrieved from http://www.interpol.int / on 8th December, 2015.

Norton. (2015). Online Fraud: Phishing. Retrieved from http://in.norton.com/cybercrime-phishingcom/cybercrime-phishing on 8th December, 2015.

Reyes, A., Brittson, R., Shea, K.O., & Steele, J. (2011). Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors. USA: Syngress.

Schuette, B. (2015). Consumer Alert. Retrieved from http://www.michigan.gov/ag/0,4534,7-164-17337-252538 --, 00.html on 8th December, 2015.
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime and Technology Crime
Words: 4865 Length: 14 Document Type: Research Paper

Cyber Crimes The available and accessible features of 21st century make it hard for any individual to think about a life without technology. In real, the world has crossed several stages and eras devoid of the cyber world. Despite this truth, imagining life without technology is a difficult task today. This is because communication between countries of the two opposite poles has now become easy; it's merely like being in touch

Canadian Policies to Thwart Terrorist and Criminal
Words: 3624 Length: 11 Document Type: Research Paper

Canadian Policies to Thwart Terrorist and Criminal Activities Canadian Policies to Combat Crime and Terrorism Problems being faced due to Cyber-Crime in Today's World What is Identity Theft? How and Why Cyber-Crime Occurs? Why Cyber-Crime has become an Important Issue? How Release of Personal Information makes an Individual vulnerable to Identity Theft? Future Implications Since time immemorial, crime and criminal activities have been found at an accelerated pace, however, with the penetration of the world into the twenty

Information System on Ethical and
Words: 6479 Length: 15 Document Type: Research Paper

They have a moral obligation to the South African people in this area for many reasons. First, they have an obligation to make certain that they can participate in the global economy to give their citizens the same chances for advancement as other nations. Secondly, they have a moral obligation to do everything possible to keep their citizens safe. When one discusses the topic of security in Information and Communication

What Are the Major Difficulties for the Development of Chinese Private...
Words: 2707 Length: 6 Document Type: Research Paper

China and the Economy Chinese Enterprise therefore is needed to better facilitate growth in China. In regards to China, private enterprise growth has lagged substantially behind that of State owned enterprises (SOE). Private enterprise, particularly in emerging markets will be a catalyst for future economic growth and development within the region. Free trade allows for the transfer of goods and services when demanded by specific economies. It also allows the countries

Cyber Espionage As an Emerging Threat
Words: 2349 Length: 8 Document Type: Term Paper

Cyber Espionage Over the last several years, cyber espionage has become a major problem that is impacting a variety of organizations. This is because hackers and other groups are actively seeking to exploit vulnerabilities in security networks. Evidence of this can be seen by looking no further than the below tables (which are illustrating the motivations and targets of attacks). Motivations behind Attacks on Computer Networks Percentage Cyber Crime Hactivism Cyber Warfare / Espionage ("Cyber Attack Statistics,"

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now