logo

Cyber Laws: Examples of Cybercrime, Personal Information in E-commerce, Emerging Online Frauds, Trade Secrets

   

Added on  2022-12-09

8 Pages2369 Words81 Views
Political ScienceLaw
 | 
 | 
 | 
Running head: CYBER LAWS 1
CYBER LAWS
Student
Tutor
Institutional Affiliation
Date
Cyber Laws: Examples of Cybercrime, Personal Information in E-commerce, Emerging Online Frauds, Trade Secrets_1

CYBER LAWS 2
Cyber Laws
Question 1: Examples of Cybercrime
Cybercrime is referred to as any criminal act that involve computers and networks, it also
include theft done via the use of the internet. These crimes can be either against an individual or
an organization. Some examples cybercrime that occur against individuals include;
Privacy breach: this is a cybercrime that occur when someone gets access to information
without the owner’s authorization. Privacy breach usually begins with a security breach, where
one penetrates and illegally access a protected network to steal some confidential information
(Hong & Alazab 2017).
Spamming: this is another cybercriminal activity that is common with individuals. It involve the
use of Email system in sending messages that have fake links, some malicious programs and
malware. After spamming large unknown massages are sent to the users from the unrecognized
companies, organizations or groups. The spammer then deceives the Email users with deals on
offer, promotions and some attractive components that attract the Email users which lure the
users into providing their sensitive information (Alazab & Broadhurst, 2017).
Some examples of the cybercrime against an organization include;
Ransomware attack: this can be described as a type of harmful malware, software that is made
in a way that denies access to the system data until a ransomware is paid. Ransomware spreads
by unknowingly visiting of affected websites or by phishing emails. This can either be
devastated to an organization or individual. With this important data stored in a network or
computer is at risk. Ransomware recovery may not be an easy process as it may require specialist
service for the recovery of lost reputation. Some victims, however, pay to recover their file
although there isn’t a guarantee that recovery may be successful (Kharaz, Arshad, Mulliner,
Robertson, & Kirda, 2016).
Distributed Denial of Service: Another most popular hacking method is DDoS. In this attack,
the networks and services that are successfully running are completely or temporarily
interrupted. They compromise some function of the website to make it unavailable to the user
when the system is offline. DDoS can be also described as a traffic jam blocking up the main
road hence not giving way to regular traffic from arriving its endpoint (Huston & Iekel-Johnson,
2018).
Cyber Laws: Examples of Cybercrime, Personal Information in E-commerce, Emerging Online Frauds, Trade Secrets_2

CYBER LAWS 3
Question 2: how personal information is used in e-commerce application and how it should
be controlled.
Electronic Commerce can be elaborated as an online business, where people buy and sell
goods and services over the internet. In the e-commerce, the virtual store is on the website and
records and communication are operated electrically. In most cases, the online business usually
involve the use of credit cards for the transaction which can be done anywhere as long as one is
connected to the internet. During this transaction personal information is important in either
online and offline transactions. The growth of a web-based information system has made
information to be confided. There is a need for the customer and the sellers to make an
agreement on the methods of data collection, manipulated and stored and as a result of this more
personal information is collected.
Personal information can be controlled by the seller in order to ensure security; the
information obtained during the transaction should be protected from unauthorized persons. By
preventing illegal access to system protect sensitive information within the system. Security and
privacy can also be considered when designing a website for shopping online. The seller should
also fight in building and winning the buyer's trust. This will help in the effectiveness of the
online business (Choi, Lee & Sohn 2017). Personal information can be as well be controlled by
changing the inaccurate information on credit card.
Question 3: “Emerging Online Frauds: Detection and Their Possible Controlling Strategies
in E-Business.” summary
a. The unethical practices in e-business as discussed in the journal.
The paper reviews some security threats that are associated with online business in the
current environment that occur through digital marketing. The major unethical e-business
practices identified in the article are as discussed below.
The article has addressed spear phishing as one of the major e-business practice. This act
involves the stealing of individual’s personal information by malicious individuals. This is done
by sending emails that are designed to collect an individual’s sensitive information
(Vishwakarma, 2017).
Cyber Laws: Examples of Cybercrime, Personal Information in E-commerce, Emerging Online Frauds, Trade Secrets_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
DDOS attack
|5
|1194
|491

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87

DDOS and Ransomware - Desklib
|4
|739
|285

Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks
|4
|1162
|199

Cyber Crime Trends Research Paper 2022
|10
|3676
|38

Network security - Sample Assignment
|10
|2195
|122