Cyber Security: A Review of Cyber Dependent Crimes and Techniques Used by Experts

   

Added on  2023-06-13

5 Pages1329 Words138 Views
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author note
Cyber Security: A Review of Cyber Dependent Crimes and Techniques Used by Experts_1
1CYBER SECURITY
McGuire, M. and Dowling, S., 2013. Cybercrime: A review of the evidence. Summary of
key findings and implications. Home Office Research report, 75.
McGuire and others in this article aims to address the main points that are related to
the cyber dependent crimes like the hacking. Cyber dependent crimes can only be committed
using a computer network or a computer system and communication technology. The aim of
this paper is to highlight the techniques used by the cyber security experts for the removal of
this type of the crime. This paper also includes several recherché that have conducted
throughout the years showing the increase in the trend (Sepúlveda and Khan 2015).
Although hacking is one of the major crimes in the modern day but it has been seen that the
number of such crimes are increasing with days.
There are two main types of the cyber dependent crimes, firstly the illicit intrusions
into computer networks that is the hacking and cracking of the systems and secondly the
downgrading of computer functionality and network space, for example the DDos attacks,
malware injection attacks and others (Carter, Sofio and Alperen 2017) There are three types
of vulnerabilities according to the recherer which affects the system the most namely the
Virus: these are the most common and well known type of malware that affects a system.
These are the type of the dysfunctions that effects the system in the terms of deleting the
hardware, software and the other files (Laybats and Tredinnick 2016). This type of the
attracts host a system, but cannot work if the system is not been continuously used.
Worms are the types of the self-replication programs but this type of malwares can
only spread inside a system. The work of this is fill up the hard disk space in a system and are
somewhat more dangerous than the viruses. The Trojans are the form of the malware that
enables a attacker to access the files of the host computer remotely (Nordstrom and Carlson
Cyber Security: A Review of Cyber Dependent Crimes and Techniques Used by Experts_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network security - Sample Assignment
|10
|2195
|122

Introduction to Cyber Security
|14
|3209
|388

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Cyber Crime: Types, Impact, and Prevention
|6
|1317
|227

Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87