logo

Cyber Crime Research Paper 2022

   

Added on  2022-09-12

13 Pages3920 Words15 Views
 | 
 | 
 | 
Running head: CYBER CRIME
CYBER CRIME
Name of the Student
Name of the University
Author Note
Cyber Crime Research Paper 2022_1

1
CYBER CRIME
Introduction
There has been a significant growth in the arena of cyber criminality
over the few decades. It can be understood that the breaches relate to the
leak of personal data or information in a massive scale which also leaves the
victim of such crimes vulnerable to fraudulent activities. There are various
tactics that are shifting as the businesses are considered to be targeted.
Therefore, due to the rise of cyber-crimes the individuals have to stay alert in
order to not succumb into falling as a victim to such crimes. There is a
distinction between the several nation states regarding the criminal groups
as such is considered to be increasingly blurred as the attribution of cyber-
crime is considered to be a little difficult. There are several Russian-speaking
cyber groups which are considered to be posing a threat to the interest of
the United Kingdom. However, the homegrown young criminals are
considered to be more sophisticated and thus, they are considered to be the
rising threats. There are several young cyber-groups which are driven by the
peer kudos regardless of the rewards but the organized UK cyber-crime
groups are considered to be motivated through the profit. The cyber
criminals are considered to seek and exploit the human as well as the
security vulnerabilities in order to acquire or obtain the data or information
and money directly. Therefore, such criminal activities are considered to be
dangerous as it effects the individual mentally, physically, socially and
psychologically1.
This paper discusses cyber-crimes and why such crimes are considered
to be precarious and perilous. In addition to such it also discusses the
accuracy regarding the ‘real’ evidence and the ‘non-real’ evidence and
critically evaluates the factors and the values regarding such. In conclusion,
it summarizes the points that have been discussed in this paper.
1 Saunders, Jamie. "Tackling cybercrime–the UK response."
Journal of Cyber Policy 2.1
(2017): 4-15.
Cyber Crime Research Paper 2022_2

2
CYBER CRIME
Discussion
Cyber-crime is considered to be defined as the crime or the criminal
activity where the computer is the object and there is a tool which is used in
order to commit such an offence. The criminals also use the computers in
order to gain certain imperative data or information. The perpetrators or the
offenders are considered to access the information and perform certain
illegal activities which might referred to as hacking. The criminal activities
that are considered to encompass the target computer networks along with
the devices as these types of crimes are considered to include the viruses for
the denial-of-service attacks. There are other kinds of criminal activities
which use certain computer networks in order to stalk some other individual
or commit crimes involving fraud as well as identity theft. There are three
major categories cyber-crime falls into these include individual, property and
the government. In the individual category the cyber-crime is considered to
involve a certain individual distributing certain malicious or an illegal
information online2. Cyber-stalking, trafficking and distribution of
pornographic images falls under the purview of cyber-crimes against
individuals. In the category of cyber-crime related to property it includes the
real-life instance of any offender trying to illegally possess any individual’s
bank credit card details. If the hacker or the perpetrator gains an access to
the funds or tries to make purchases online or tries any kind of phishing
scams in order to circulate the personal information of the individual by
using a malicious software would be considered to have committed this
category of crime. The third category is considered to be the government
which is also the least common type of cyber-crime, however, in spite of
such it is considered to be a serious offence. The crime against any
government is also understood as cyber-terrorism and such includes the
hacking of the government websites and along with such the military
websites which are considered to be involved in distributing the propaganda.
2 Cockcroft, Tom, Z. Cliffe Schreuders, and Pip Trevorrow. "Police cybercrime training:
perceptions, pedagogy, and policy."
Policing: A Journal of Policy and Practice (2018).
Cyber Crime Research Paper 2022_3

3
CYBER CRIME
The perpetrators or the criminals are considered to be the terrorists and the
enemies of the governments relating to other nations3.
Apart from those kinds of crimes there are identity theft which occurs
or takes place when any offender gains any kind of access to another
individual’s data or information and tries to steal certain funds or gets hold of
any confidential information or on the other hand takes part in insurance
fraud or participate in any tax or health fraud. It can also involve getting an
access of a phone or any internet account in the name of the user and try to
plan a certain kind of criminal activity regarding such in order to gain any
kind of benefits as an offender. Cyber-stalking is another form of cyber-crime
which is considered to include online harassment and the user or the victim
is considered to be subjected to an overabundance of several online
messages as well as emails. The cyber-stalkers are considered to typically
use the social media websites and along with the search engines in order to
intimidate the user or the victim or to instill a certain kind of fear among
them. The cyber-stalker is also considered to know the victim and they are
considered to make that individual feel afraid for safety. PUPs or the
Potentially Unwanted Programs are considered to be less threatening than
other forms of cyber-crimes but these are also considered to be a kind of
malware4. These are considered to uninstall essential software in the system
which are inclusive of the search engines as well as the pre downloaded
applications. These also include the spyware or the adware therefore, it is
considered to be a good idea in order to install certain antivirus programs
and software which would help in avoiding these malicious downloads.
Phishing is considered to involve the hackers in sending various malicious
email attachments which would be used by the users in order to gain access
to their accounts from the computer. The cyber-criminals are considered to
become more established as these emails are not considered to be flagged
3 Williams, Matthew L., et al. "Under the corporate radar: Examining insider business
cybercrime victimization through an application of routine activities theory."
Deviant
Behavior 40.9 (2019): 1119-1131.
4 Blakemore, Brian.
Policing cyber hate, cyber threats and cyber terrorism. Routledge, 2016.
Cyber Crime Research Paper 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents