Wednesday, May 6, 2020
Literature Review about Reflective Report Writing Of Cybercrime
Question: Describe about cybercrime and its major categories? Answer: In order to develop the World Wide Web and internet, developer faced wide range of issues. Therefore, in order to mitigate these issues, student of IT has to study about the professional issues in Information technology (PIIT). It always relies at the heart of information technology. Since early days, criminality and crime both associated with each other. In different countries, the content of crime is different. Based on the nature and extent, crime is depended. In these modern days, information technology helps in generating business effectiveness and increasing performance. Professional Issues in Information Technology (PIIT) mainly occurs in the years of science and technology. Several authors provide lot of definition about Information Technology. Some critics say that information technology is the heart of computer that affects the era of business and their own network. Some critic defined that cybercrime is one type of crime that committed in the network of computer using inte rnet as well as other tools. However, it has been learned that computer is one of the most important part that considered as tools of information technology. However, it is identified that computer considered as an integral part of professional information technology from the point of view of internet and World Wide Web. From the point of view of internet access, information technology generates wide range of benefits to the organization in all sectors such as business industry, educational sector, etc (Dixon, 2007). There are several examples of information technology that learned in lesson such as knowledge management system, automatic generation of information via application, etc. In other words, information technology defined as the violence action. Majority of organization in these days used information technology in their business process for improving the purchasing as well as logistics system and generate higher value (Beck Boyd, 1978). There are some ways that a person ab le to work in a team such as Positive Outlook: It is very impotent in order to work as an IT professional. Positive attitude helps in changing the work and make stable in IT career. Love for Challenge: In order to work in IT sector, person has to show their enjoyment in multi disciplinary work (Engdahl, 2010). Ability to adapt to a change: It is also an important factor in terms of being IT professional. This is required because software or application change frequently. Patience, Patience and more Patience: When a person work as a member of team, this is required. It may be stressful as well as challenging but creates more fun in future. Careers in IT Information technology is broad subject and varies several types of job. Regarding information technology, there are wide range of opportunities to get job an develop career such as Business Analyst System Analyst Network Administrator Computer Design Computer Programmer Web Designer Web Developer Cybercrime In my literature review, it has been describe that there are three major categories of cyber crime such as crimes against property, government and person. Cybercrime against person is that harassment to people via cyber stalking, emails, fake phone calls, etc. Cyber Stalking is one of the most common and popular cybercrime where attackers use wide range of protocols like user net group, e-mails and chat rooms (Cartwright Scisco, 2004). Using these protocols, attackers provide different types of harassment such as religious, sexual, racial, etc. Thos kind of cybercrime mainly occurs from the teenagers and woman. Cybercrime against property occurs when the attackers develop harmful program and send it to others computer user via internet (Rijlaarsdam, Bergh and Couzijn, 2005). It had been learned that attackers using internet send virus to the personal computer and access entire information from that particular computer. Email scam is one of the great example of cybercrime against property. Attacker sends emails with virus and demand to put bank account details into the emails body. Apart from that, hacking of the companys website is also another example of cybercrime against property. As consequence, cyber terrorism is one of the most serious type of crime from the viewpoint of cybercrime. Hacking into the military sites, governments websites are the key examples of cyber terrorism. In my literature review, it has been learned by me that in technology environment, criminals of cyber categorized into different group. These are as follows Organized hacker: In order to fulfill certain objectives, these types of hackers are organized. The main aim of these hackers is to hack the political website and put bias information, fundamentalism, etc. For example, recently one hacker hack the Facebook page of Facebook developer Mark Zuckerberg. This type of hacking falls under the category of organized hacker. Discounted employees: There are huge people in the world who dissatisfied with the employers or sacked by some organization. Those types of people fall under this category. In order to take revenge from their employer, people under this category hack the system of employer. Professional Hackers: These types of hackers motivate to make money. The main aim of professional hackers is to make money from internet. Professional hackers mostly hacked the website of banks, big organization that is related to the financial sector and get the reliable information from site. I learned there are several reasons for cybercrime. The reasons of cybercrime are as follows Easy to Access: Safe guard is the main problem of computer system. Due to the complex of technology, there is present possibly of breach regarding unauthorized access. Therefore, most of the user set up their computer password in order to prevent unauthorized access using codes, retina, key loggers, advance voice recorders, etc. I learned that this type of system could easily access these passwords via bypassing the firewalls and using bio metric system. Negligence: The term negligence closely connected with the technology that conducted by human. In order to protect the computer system especially for business industry need to be any negligence. It is not maintained properly, cyber criminal access information from computer system and control the overall system. Loss of Evidence: It has been identified that loss of evidence is a big problem and very common from the point of view of cybercrime. Cyber criminal most of the time destroyed data from victim computer. Capacity to store data in small space: Computer system has the capacity to store data huge data in very small space using unique characteristic. Therefore, it is easier for the cyber criminal to access information or remove it. Complex: In order to operate the computers, need to install one operating system such as Linux, windows, Mac, etc. However, these types of operating system are composed with the million of codes. In my literature review, I learned that in major cases human mind fails to write code with proper way. They often lapse in any stage during writing the codes of operating system. The cyber criminal take advantage of lapse in any stage and penetrate the computer system. There are several manner and mode of cyber crime such as Hacking (unauthorized access): Hacking is the common term in internet area. Regarding unauthorized access, Information and Communication Act was formed in 2006. This act allows the user in protecting unauthorized access of information during interchangeable. Email Bombing: This is also popular crime in internet. There are majority of attackers that send bulk amount of emails to the computer of victim. The main intention of these type of attackers is to crash the system of victim. Worms Attack: Worms attack is also known as the virus. Attacker send virus in the form of data into victims computer for corrupting the file. The main functionality of work attack is to copies the computer memory and transfer into another computer. For example, love bug virus affected in the globe computers and losses $10 billion in business. Robert Morris created this virus in 1988 for accessing information from victim computer. Trojan Attacks: It is the most popular and harmful origin in terms of cybercrime. Attacker installed Trojan into the victims computer via chatting and access information from victims computer. Web jacking: I leaned that using the technique of Web Jacking, hackers gain information from the victim computer over internet. Majority of attacker use web jacking for providing their own information via government website. I learned that via the technology of web jacking, hacker hack the website of other and make the site according to their own demand. Moreover, I understand that cybercrime is classified into three groups such as against individuals, against organization and against society. Harassment via email: In these modern days, harassment via emails is the new concept of cybercrime. Cyber criminal send emails that contains virus to the victims computer system in the form of letter. When the victim download letter in his or her computer virus automatically runs and access information about the computer. Apart from that, I learned that majority of people send continuous emails to the victim computer. Harassment via email is the common cyber crime in these days. Cyber Stalking: It is also the new concept of cyber crime. The main concept of cyber stalking is that the criminal of cyber observes the movement of person across the internet via posting different type of message or entering chat room frequently to the victims computer. Defamation: cyber defamation is same according to the general defamation. I learned that this type of cybercrime mainly occur for the teenagers. For example, someone hacks the email id or Facebook page and change the status that he is in relationship or post some bad pictures, etc. As time passed, affects of cybercrime increased fast in comparison to other crime. There are several factors unable to detect or analyze the causes of statistic of cybercrime. Firstly, in these present days, aggressive development of technology is growing faster. This make difficult to detect cybercrime. Due to lack of knowledge as well as expertise officially, cybercrime still not analyzed or detected. Apart from that, most important method that hide the criminal activity regarding cybercrime is that when activity of cybercrime detected for a business organization, the owner of the firm lodge report for not to published name due adverse publicity. These are the main reason that leads to hide the actual nu mber of cybercrime cases in the world. Access over computer system: Unauthorized access over computer system is called cybercrime. In the world, there are several rules and regulation of hacking interchangeable in terms of hacking. In internet, various hackers access information of victim computer via providing virus or run firewall system breaking code. In order to mitigate hacking confusion, or prevent the information from being hacked, user of computer system can involve Act 200 of hacking. Email spoofing: In my literature review part, I learned that email spoofing is one of the ways of misrepresenting the origin. It has been identified that some hackers send emails to the victim for asking banking details that looks like original according to the email of banking sector. Recently the student of the University of Western Australia received emails to changing their password due to technical up gradation. According to the student of University, this email came from technical department of the University. However, this mail was traced by the technical department and aware student for never accept this type of emails without any notification of the University. Intellectual property crime: According to the critics, intellectual property consist wide range of rights in terms of protecting property. Therefore, it has been also identified by me that unlawful act may deprived completely. In order to protect the intellectual property, people have to violate software privacy, infringement, trademark, violation, source code of computer, etc. However, it has been often seen that majority of people access information or copying file without any authentication. For example, in internet several websites provide software application without permission of Microsoft. Terrorism of cyber against governmental organization: It has been understood by me that there are required to distinguish between the cyber crime and cyber terrorism. However, both of these two consider under the act of criminal. It has been realized that cyber crime generally consists under the domestic issue. However, it has some consequence in international. On the other hand, cyber terrorism is considered as the global issues. It has both international and domestic issues in respect to cybercrime. In order to protect the common form of terrorist attack in internet, victim has to use anti malware threat protecting software, or avoid unknown sources email. Majority of cyber criminal uses 512-bit encryption method in order to decrypt the information in governmental website. From this point of view, website of government has to use 1024-bit encryption method in terms of sharing information. Trafficking: Hackers assumes different forms of trafficking to the victim. In general, trafficking are can be in different in form such as human beings, arms weapons, drugs, etc. It has been identified that trafficking is the modern type of slavery. According to critics, trafficking is the fastest growing crime. Fraud and Cheating: In these modern days, online fraud and cheating is the lucrative cybercrime in these days. In internet, victim received different chat request from different server. It has been seen that in some cases online fraud and cheating pertaining to the contractual crime, credit card crime or jobs offering. From the point of view of fraud and cheating, it has been identified that there are several engineers work on the back office of customer care. During the working time, they fraudulently access information of customer credit card. Description of Changes In this world, cybercrime is ironically increased. Therefore, awareness of cyber security will be the best methodology or appropriate technology of protecting the threats of cyber crime. In my literature, review learned that technology site CNET stated that there are majority of companies that suffer from electronic threat or harassment both physically and mentally. In this physical world, people move one company to another due to change of job position (Stefoff, 2009). Therefore, if the employee wanted to steal the information of previous company such as operating manuals, battle plan, target market, target customer, etc they have lots of chance to copy file from the system of the organization in a small USB device. In order to protect the cyber crime and keep safe the information from hacker, need to follow the steps Secure the computer: In order to secure information in one computer, people have to active firewall protection. Activation of firewall allows the people in avoiding unknown source and keeps safe the computer from virus attack. Apart from that, user of computer especially the business organization has to use antivirus software that protects malware theft in internet. Moreover, in order to block the spyware in computer system need to update antivirus software application regularly. Use of Strong Password: Majority of cyber criminals hack information via internet of their victim computer. Therefore, in order to protect the cybercrime in internet, computer user has to use strong password in their own account that contains at least 10 characters in length with combination of numbers, capital and small letter along with special characters. Install latest operating system: In order to keep safe the information, organization in business sector has to install latest operating system with update features. For example, if the organization installed windows latest operating system they can easily access information if any employees insert USB device into the system. This will be the better technology for preventing personal information. Data Protection: When the organization especially the organization that operates in financial sector share information to other, need to use RSS encryption technology. It will help in protecting data from hacked into the server. 512-bit encryption method will be the best technology of encrypting data and protect from hacker. Apart from that, organization in financial sector has to take regular backup of their information and store in into the other location such as external hard disk or cloud server (Ross, 2010). Secure wireless network: In these modern days, companies use wireless connection technology in order to create intranet connection over workplace. It is also one of the lapse points by company because hacker using the wireless network attacks into their server room and access information. Appropriate combination of password and user identity technology in wireless network will be the best methodology (Vanelstraete Francken, 1997). The IT department of financial sector has to set up the network that protects access of internet when it identifies unknown IP address use system. Apart from that, computer user has to justify proper identity when they sale or purchased products via online. Moreover, when user access social networking site, they have to be more conscious. References: Beck, C., Boyd, D. (1978).The moral education project (year 5). [Toronto]: Ministry of Education. Cartwright, T., Scisco, P. (2004).Developing your intuition. Greensboro, N.C.: Center for Creative Leadership. Engdahl, S. (2010).Cybercrime. Farmington Hills, MI: Greenhaven Press. Ross, J. (2010).Cybercrime. New York: Chelsea House. Stefoff, R. (2009).Cybercrime. Tarrytown, N.Y.: Marshall Cavendish Benchmark. Vanelstraete, A., Francken, L. (1997).Prevention of reflective cracking in pavements. London: E FN Spon.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.