logo

Computer Crime and Digital Forensic : Report

15 Pages3299 Words123 Views
   

Added on  2020-02-24

Computer Crime and Digital Forensic : Report

   Added on 2020-02-24

ShareRelated Documents
Computer Crime and Digital Forensic Cyber Crimes1 | Page
Computer Crime and Digital Forensic : Report_1
Computer Crime and Digital Forensic Table of ContentsIntroduction......................................................................................................................................2Discussion........................................................................................................................................2Hacking........................................................................................................................................2Theft.............................................................................................................................................3Electronic Funds Transfer Crime................................................................................................4Malicious Software......................................................................................................................4Cyber Stalking..............................................................................................................................5Terrorism and Extortion..............................................................................................................6Telemarketing Fraud....................................................................................................................7Denial of Service Attack...............................................................................................................7Data Diddling..............................................................................................................................8Spamming.....................................................................................................................................9References......................................................................................................................................102 | Page
Computer Crime and Digital Forensic : Report_2
Computer Crime and Digital Forensic Introduction Nowadays, with the advancement of internet and its technologies, the issues of their security such as hacking, phishing and other cyber-attacks have raised at large extent. These issues are commonly known as cyber-crimes. Due to these cybercrimes, internet users are worried about security and privacy of their information that is transferred over internet. The different types of cyber-crimes are hacking, electronic fraud transfer crime, malicious software, telemarketing fraud etc. The purpose of making this report is to emphasize on ten topic of cyber-crime and provide detail discussion about those topics. DiscussionCyber-crime is committed over internet by professional hackers and invaders. It has very bad impact on common user and business organizations those are fully concerned with internet to perform their different business and other activities. Now in upcoming paragraphs, I will briefly discuss each cyber-crime. Hacking It is one of vulnerable cyber-crimes. Through this cyber-crime, computer of an individual is accessed by an unauthorized user without permission of that individual. This crime is done to access the personal and confidential information from an individual’s system. There are various hacking software available that are used by cyber-attackers (Banyeresdelpenedes.com, 2017). Hacking is not an easy to do and sometimes, hackers do unexpected things such as system breaking and stealing of a secure data. Moreover, it is surprising to believe that hacking can be good or evil (TechRepublic, 2017). It can be a fraud of rights of people or can be done for safety purposes of them. But in most of the cases, hacking has always put bad impact on internet users. 3 | Page
Computer Crime and Digital Forensic : Report_3
Computer Crime and Digital Forensic There are several examples of vulnerable hacking cases that are concerned with large business organizations such as eBay’s database hacking case is considered most vulnerable case of hacking where most of the confidential information is accessed from company’s computer by obtaining its secured password. In this way there are various other companies exist those have already encountered this issue (Geek.com, 2017). It is commonly seen that hackers mostly try to hack banking and e-commerce websites that are used by users for money transactions. Therefore,I can say that to get prevention from hacking, secure software solutions should be used that can protect system from unauthorized access. This is required when our computer is connected with internet. TheftTheft is also a harmful cyber-crime. While committing this digital crime, copyrights are violated by a person. It is commonly seen that while downloading movies, music, video, e-books and any other digital material copyrights are broken by users and it is unethical form of accessing information from internet. This cyber theft is also known as online piracy. This piracy has influence on many people, especially in film industry it hurts emerging artists as well as established artists. Here I would like to give an example of Hollywood Studio where financial backing was implemented to track illegal streams and downloads. From outcomes of this process, loss of millions of dollars was estimated. This cyber-crime of online piracy so much hurts independent creators who do struggle for making a particular movie, videos and other digital material (Granados, 2017). It is commonly seen that how uTorrent is used to download movies, videos etc. by using hacking techniques and it is considered as theft of digital data. Moreover, in case of music industry, a video album is produced with hefty cost and due to onlinetheft, a creator bear heavy loss. It is very important to fight against internet piracy, otherwise it 4 | Page
Computer Crime and Digital Forensic : Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Defense in Web Based Attacks Report 2022
|4
|728
|16

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15

Cyber Crime and the Role of Hackers in Russia
|13
|3237
|475

Hacking and Unauthorised Access
|5
|1343
|68

Preventive Measures Against Identity Crime and Consumer Scams
|9
|2330
|491

Network Management Methodology
|6
|1550
|84