Você está na página 1de 4

Running head: CYBERCRIME

Cybercrime
Students Name
University Affiliation

Cybercrime
Cybercrime is arguably one of the latest domains of crime. It can be defined as a crime in
which a computer and internet are involved as the principal instruments of committing the crime.
Often, cybercrime has been considered as one of the most tempting' crimes due to the apparent
anonymity of computer technologies. As a result, the rate of cybercrimes has rapidly increased
since those committing the crime always think that they are invincible and may never be caught.
The most common cybercrimes include hacking, spamming, and phishing (Taylor, 2006).

CYBERCRIME

The 21st technology is evolving at a higher rate, and the rate of this growth is believed to
have created the right grounds and platforms for cybercrimes. The most popular and the biggest
crime of all cybercrimes is hacking (Kibernetska, 2014). It is defined as the act of illegally
acquiring private data; for instance, information on political or military matters, and even those of
the economics of an organization, for malicious gains (Herley, 2014). However, according to Jon
Erickson (2008), most hackers engage themselves in the unlawful activity just for fun, and not
necessarily for any commercial gains. Bernat and Makin (2014) further explain that hacking not
only involves individuals who unlawfully break into computers, but also includes a cohort of
people who have helped improve internet security, as well as program reliability. Does this really
justify the acts of hackers?
Attacks on networks and computer infringements have indeed affected numerous aspects
of the national security of many countries. It is very apparent that the organizations of terrorists
have nowadays graduated to using the internet for their terror activities like recruitment and
relaying of information (Brenner, 2010). There are recent cases where terrorists used the social
media platform to inflict fear, taunt their target enemies, and even propagate the terror acts. A
good example is when Al Qaeda produced an online magazine, in order to share ideas amongst its
members (Brenner, 2010). Al-Shabaab, an Al-Qaeda, allied terror group, is also famous to be
using Twitter, a social media platform, for the same.
Cyber spying is also another traditional form of cybercrime. It is a form of crime where a
foreign nation pursues to acquire the intellectual property and trade secrets of a rival nation for
economic gain and even sometimes for military advantage. These foreign cyber secret agents
tend to seek and exploit the flaws of the computer networks of the victim nation (Reyes,
2007).They, therefore, gain access to crucial government, military and valuable commercial

CYBERCRIME

information of the target country. This can result in a compromised national security and even
gives the foreign nation a competitive advantage in terms of international trade affairs.
Cybercrimes have become the primary concern of the whole world, especially the attacks
on networks and intrusions on computers. Computer intrusions are the most common and
apparently the most dangerous and sophisticated form of cybercrimes. Most country's crucial
governing framework, military facilities and control networks are the most vulnerable targets for
these anonymous criminals and potential enemies alike. Companies are also not left aside, and in
most cases, they have suffered an attack on their networks, enabling rival organizations to access
their crucial and private information. On the other hand, learning institutions such as universities
are also being targeted by hackers and crackers, for the important and vital research. Cybercrime
is thrashing every corner of the world, and even homes are not safe at all since a greater portion
of identity theft is directed on the latter. No one is safe to these cybercrimes, including
individuals, companies, and worldwide nations, hence, necessary measures must regularly be
exercised to help curb this menace.
References
Kibernetska, K. (2014, August 27). Cybercrime. Retrieved from
http://www.justice.gov/usao/priority-areas/cyber-crime
Jon, E. (2008). Hacking: The art of exploitation. San Francisco, Calif.: No Starch Press.
Herley, C. (2014). Security, cybercrime, and scale. Communications of the ACM, 57(9), 64-71.
Bernat, F. P. & Makin, D. (2014). Cybercrime theory and discerning if there is a crime: The case
of digital piracy. International Review of Modern Sociology, 40(2), 99-119.
Reyes, A. (2007). Cybercrime investigations are bridging the gaps between security
professionals, law enforcement, and prosecutors. Rockland, MA: Syngress Publishers.

CYBERCRIME
Brenner, S. (2010). Cybercrime: Criminal threats from cyberspace. Santa Barbara, Calif.:
Praeger.
Taylor, R. (2006). Digital crime and digital terrorism. Upper Saddle River, NJ: Prentice Hall.

Você também pode gostar