ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cybercrime or a crime don't know?

Verified

Added on  2021/06/15

|7
|2069
|406
AI Summary
NETWORK MANAGEMENT IN ORGANIZATION NETWORK MANAGEMENT IN ORGANIZATION 5 5 NETWORK MANAGEMENT IN ORGANIZATION Network Management in Organization [Name of the Student] [Name of the University] [Author note] Introduction: 3 Identification of the issues: 3 Systematic analysis: 3 Research finding and recommendations: 4 Conclusion: 5 References: 7 Introduction: Cybercrime or a crime done by making use of a computer mainly includes a computer and a network. Cyber-crime is mainly related to the use of the computer network or

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: NETWORK MANAGEMENT IN ORGANIZATION
Network Management in Organization
[Name of the Student]
[Name of the University]
[Author note]

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
NETWORK MANAGEMENT IN ORGANIZATION
Table of Contents
Introduction:....................................................................................................................................3
Identification of the issues:..............................................................................................................3
Systematic analysis:.........................................................................................................................3
Research finding and recommendations:.........................................................................................4
Conclusion:......................................................................................................................................5
References:......................................................................................................................................7
Document Page
3
NETWORK MANAGEMENT IN ORGANIZATION
Introduction:
Cybercrime or a crime done by making use of a computer mainly includes a computer and a
network. In this type of crimes a computer might be used for the purpose of commissioning a crime or
to target a computer. So cyber-crime can be defined as “Offences that are committed against individuals
or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails,
notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)" [1]. Cybercrime is associated with
threatening a particular person or the security of a total nation or any other type of vital information
stored online. The individuals associated with cybercrime are known as cyber criminals and they
generally makes use of the computer technology in order to get access to the personal information or
secrets related to business or trade. They might also make use of the internet in order to perform
malicious and exploitive activities. Cybercriminals are often called hackers.
Identification of the issues:
Cybercrime can be of different types like online theft of banks, theft of identity, online predatory
crime and many more. One of the major cybercrime is cyber terrorism which is a significant concern. A
wide range of activities are encompassed by the cybercrime. The major issues includes the hacking
which is the process of cracking into a system followed by gaining or unauthorized access to the data
which are stored in the system. Cyber-squatting is another issue related to cybercrime. Cyber-squatting
can be defined as an act by the cybercriminals where they register a famous domain name and then
they sale it later. This is a severe issue which has not been tackled even by the IT Act 2000. Phishing is
another issue where the cyber criminals try to fool the common people and make them pay for
something. Cyber Stalking is another issues where the internet or other electronic devices are used for
the purpose of stalking someone [2]. This generally involves harassing or threatening behaviors. The
next issue is the Vising. This is an issues where the criminals are associated with practicing the use of
social engineering and the voice over IP in order to gain access of the important information from the
public in for various type of financial rewards. Other major issues includes the Trojan horse (this is an
unauthorized function which is associated with functioning from inside and seems to be an authorized
program), internet time theft (this means the hackers use the internet and someone else has to pay for
that usage), web jacking (this happens when a website is forcefully taken by someone else), click jacking
Document Page
4
NETWORK MANAGEMENT IN ORGANIZATION
(this is a form of cyber-attack where the attacker is associated with the usage of an invisible layer over
any embedded layer) and many more.
Systematic analysis:
Cyber-crime includes various type of activities. Once the crimes only included the fundamental
breaches of the private or the corporate privacy which mainly included the assaults on the integrity of
information which are stored in different digital storage facilities along with the use of eth information
which are obtained illegally in order to blackmail a firm or a particular individual. Cybercrime is generally
broken down into two categories and this mainly includes the “crimes which targets a computer
network or a device” and “crimes which uses the computer network to make advances in the various
criminal activities”. The crimes related to the targeting of the computer network or devices mainly
includes the use of virus and Denial-of-service attacks [3]. Whereas in the crime related to the usage of
the computer network mainly includes the cyber stalking, phishing and fraud and many more. Another
part of this type of crime involves individuals within corporations or
government bureaucracies’ deliberately altering data for either profit or political objectives. At the other
end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the
Internet.
Research finding and recommendations:
Form the research it can be concluded that there exists several type of cybercrime and the types
have been listed below:
Hacking: This is process by which the unauthorized person known as the hackers attempts to
gain an access to the information system. This is considered as a crime because it includes intrusion to
the system without any kind of authorization [12].
Cyber-Stalking: This is the crime which is associated with harassing someone by making use of
the internet. The main behaviors included in this type of crime are false accusations, threats and many
more. This type of crime involves the following of someone’s movement across the internet which is
mainly doe by posting of messages on the bulletin boards which are frequently used by the victim and
many more places [4].
Spamming: This can be considered as another form of cybercrime which is associated with
sending of bulk unsolicited ad commercial messages over the internet. This is very irritating but this is

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5
NETWORK MANAGEMENT IN ORGANIZATION
not illegal unless and until it causes any type of damage such as overloading of the network, disruptive
service and many more [11].
Cyber-Pornography: This is crime where the main victims are the women and the children. In
this type of crime the pedophiles are associated with sending of illegal photos of child pornography to
targeted children in order to attract them towards all this [5].
Phishing: This is the process which mainly involves the acquiring of sensitive information that
mainly includes the username, password and many more. This is mainly done by the hackers by
disguising themselves as the authorized and trustworthy entity in communications which are performed
by means of electrical medium [10].
Software Piracy: This mainly includes the delivering of illegal software for personal as well as for
business use. The original software’s are copies which results in the violation of the copy right and the
license agreement [6].
Money Laundering: This is the crime which involves the moving of the illegally acquired cash by
financial as well as other systems in order to make it look like a legal transaction [9].
Corporate Espionage: This is the crime that involves the theft of the trade related secrets by
adaptation of illegal ways like the wire taps, illegal intrusions and many more [7].
Besides the above mentioned categories there also exists other type of cybercrimes like the sniffing of
passwords, spoofing, money frauds, web jacking and more. But there exists certain ways by which all
this type of crimes can be mitigate [8]. There is one famous saying which stated that prevention is much
better than cure. Adaptation of certain preventive measures while using the internet is very much
necessary. The recommended steps in order to mitigate the risks have been listed below:
Cybercrime like cyber stalking can be prevented if the user makes it sure that none of the
private information is being disclosed.
Avoidance of sending of pictures and videos online particularly to someone who is totally
unknown as well as to online friends can be a good preventive measure against misuse of
information.
Use of latest as well as updated antivirus can help in guarding against threats related to the virus
attack.
Sending of credit card details should not be done to prevent against any kind of frauds.
Document Page
6
NETWORK MANAGEMENT IN ORGANIZATION
The sites should be watched that are being used by the children’s in order to prevent any kind of
harassments and depravations of the children.
Security programs should be used which helps in providing control over the cookies and is also
associated with sending of information back to the site. This is to be done because leaving of
cookies unguarded might lead to fatal effects.
Traffics should be watched by the website owners along with checking for any type irregularity.
Putting host-based intrusion detection devices on servers can be very much helpful.
Use of firewall is very much beneficial.
Conclusion:
The above disused topics helps in concluding to the fact the cybercrime is increasing day by day.
It is not possible to eliminate the cybercrime from cyber space. It is quite possible to take preventive
measures and keep a check on it. From the past, it is evident that no regulation has ever succeeded in
eliminating crime completely from the world. The only possible step is to make people aware of
cybercrime. We would conclude with that the fact that the users should be cautioned regarding the use
of cyber space and should keep in mind that the provisions of the cyber law are not so rigorous that they
may control the growth of the IT industry and prove to be detrimental. The government still has an
important role to play, but most of the prevention needs to be done by commercial entities producing
software and those with the ability to stop fraud.
Document Page
7
NETWORK MANAGEMENT IN ORGANIZATION
References:
[1.] Taylor RW, Fritsch EJ, Liederbach J. Digital crime and digital terrorism. Prentice Hall Press; 2014
Mar 8.
[2.] Halder D, Jaishankar K, Jaishankar K. Cyber crime and the victimization of women: laws, rights
and regulations. Information Science Reference; 2012.
[3.] Broadhurst R, Grabosky P, Alazab M, Bouhours B, Chon S. An analysis of the nature of groups
engaged in cyber crime.
[4.] McGuire M, Dowling S. Cyber crime: A review of the evidence. Summary of key findings and
implications. Home Office Research report. 2013 Oct 9;75.
[5.] Hassan AB, Lass FD, Makinde J. Cybercrime in Nigeria: Causes, effects and the way out. ARPN
Journal of Science and Technology. 2012 Aug;2(7):626-31.
[6.] Sindhu KK, Meshram BB. Digital forensics and cyber crime datamining. Journal of Information
Security. 2012 Jul 25;3(03):196.
[7.] Brown CS. Investigating and prosecuting cyber crime: Forensic dependencies and barriers to
justice. International Journal of Cyber Criminology. 2015 Jan 1;9(1):55.
[8.] Lagazio M, Sherif N, Cushman M. A multi-level approach to understanding the impact of cyber
crime on the financial sector. Computers & Security. 2014 Sep 1;45:58-74.
[9.] Saini H, Rao YS, Panda TC. Cyber-crimes and their impacts: A review. International Journal of
Engineering Research and Applications. 2012 Mar;2(2):202-9.
[10.] Weissbrodt D. Cyber-conflict, Cyber-crime, and Cyber-espionage. Minn. J. Int'l L.. 2013;22:347.
[11.] Aggarwal P, Arora P, Ghai R. Review on cyber crime and security. International Journal of
Research in Engineering and Applied Sciences. 2014;2(1):48-51.
[12.] Anderson R, Barton C, Böhme R, Clayton R, Van Eeten MJ, Levi M, Moore T, Savage S. Measuring
the cost of cybercrime. InThe economics of information security and privacy 2013 (pp. 265-300).
Springer, Berlin, Heidelberg.
1 out of 7
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]