Cybercrime and Cybersecurity: A Comprehensive Report

Verified

Added on  2025/05/04

|8
|1614
|251
AI Summary
Desklib provides solved assignments and past papers to help students succeed.
Document Page
Contents
Abstract......................................................................................................................................2
Introduction................................................................................................................................3
Related work..............................................................................................................................4
Proposed Research.....................................................................................................................5
Expected outcomes and significance.....................................................................................6
Conclusion..................................................................................................................................7
References..................................................................................................................................8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
In today’s world, processing over the internet has increased a lot; most of the information is
kept on the servers and that tends or leads to cyber threats. As the threats are being
introduced, they are difficult to get caught at the early stage and that on later stages cause a
lot of damage. The aim of the report is to achieve the methods that would help in finding out
the solution to such crimes. The outcome of the topic is that the crime related to the internet
is getting increased and it would be detected and associated culprit gets the punishment.
Document Page
Introduction
With the passage of time, today’s era is utilizing the time effectively as the performance is
getting increased along with it. The increase in the performance along the time is possible
only due to the use of the internet. The internet is nowadays being used by each and every
person and this is spreading so rapidly that it brings a lot of crimes as well along with it. The
use, as well as the need of the internet, is massive and it is being appreciated a lot but along
with it, it also contains a large number of cyber-crimes as well. The report helps in providing
an overall understanding of cybercrime.
Document Page
Related work
The technology is getting advanced so do the rate of crime. These technologies develop
opportunities for criminals to commit a new type of crimes that are really devastating. The
main reason for the cybercrime is obviously the digital computer and the crime that includes
the internet, represent the extension of criminal behavior (Mohammed, 2011). The cybercrime
is the attack on the details and personal information about the person or individual,
governments or organizations. The attacks are not physical or can be felt they take place in
the corporate body that is virtual that include the set of information and the attributes that
provide the definition of the individual or of the organizations and institutions. It can be said
that the digital age that contains our virtual identities are the elements that are essential and
used every day. Nowadays every person is the identifier in the computer database that is
owned by the government and the organization. The highlights of the cybercrime have the
centrality of the computers that are networked and the fragility of the facts that are seemingly
as well as solid of the identity of an individual.
In the year of 1996, the Council of Europe with many other states drafted a treaty that was
international and covers the crimes that are committed with the computer.
There are various issues that can encounter and are related to cyber crimes:
Invasion of privacy
Wired Frauds
ATM fraud
Internet fraud
Hacking
DoS attacks
Computer viruses
Sabotage and many more
Although there are enormous issues that can be faced due to the cyber crimes here these are
some most commonly observed are discussed:
Invasion of privacy:
The cybercrime affects the virtual, as well as the real body and the effects on both, are
different. This can be seen in the crime of identity theft clearly and appropriately. This
invasion of a privacy issue is one of the major issues that can be disastrous and can result in
the destruction of the privacy of another person. This issue needs to be resolved as soon as
possible by adopting various measures. Several countries try to adopt different techniques so
as to ensure the security of every citizen and the data and information of the people. In the
US there is no official identity card instead they have a social security number. This security
number keeps access of every individual as well as the taxes that are collected from people
are also according to the social security number of every citizen. The institutions and
organization in the US use the social security number for keeping the track for their
employees and staffs. So these type of security number if get hacked then it can cause major
destruction to the privacy of person, these security number should keep secured from the
government point of view.
Internet fraud:
The internet frauds are the type of frauds that can make use of the internet and can include the
information hiding or providing the information and details that are not correct in order to
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
trick the victims and cheat them by making money and property from them (Kolodzinski,
2002).
There are more categories of internet fraud that include the phishing as well as spoofing. The
phishing is the fraud that can collect and gather the information that is personal and it can be
used by the help of emails and websites. In this, the information that can include is the
username, passwords, and numbers of the credit cards and other personal details (Frank and
Odunayo, 2013).
ATM frauds
Another fraud is the ATM fraud that is the example of the computer that makes the regular
activities and allows the fraud to occur. In the ATM machines that are used by all the people
across the world access their accounts with the help of personal identification number that is
the PIN and the criminals has found out the way through which the ATM PIN of the
individual can get captured and hacked through which the bank account and all the money of
the user can be at risk. Unexpected withdraws and loss of money can be the major issues that
can be faced. This particular problem can be resolved by providing the major security that
needs to be strong so that the privacy and PIN number of the individual can be kept secure
and safe. Also, the use of biometric of every individual can be added in the ATM’s PIN or on
the machines (Das and Nayak, 2013).
Wire frauds
The wire fraud is another type of crime that can result in major issues for the individuals by
defrauding or by getting the money that is based on the representations that can be false as
well as fake promises. The wire frauds can include the hacking and attacking the data and
information of the person by using the electronic communications like using the phones and
mobile devices, fax or emails, texting, messaging, social media and many more (McQuade,
2006).
Proposed Research
Problem Statement
The entire report is based on the cyber-crime activities that are increasing on a great extent
with the passage of time. As the use of the internet is increasing at a great extent in today’s
world, the crime rate in the field of the internet is increasing at a high rate. The entire belongs
to the scenario covering all the points related to the cyber-crime as well as cybersecurity. It is
seen that if any of the resources provide great help to the people then same resource also has
another face which shows the darker side and same considered for the internet as well (Taylor
et al., 2014).
Aim of the research
The aim of this research is perfectly dependent upon the various factors:
The first factor on which the aim of the research depends is the discussion related to the
cyber-crime as well as the measures taken for solving such cases regarding the cyber-
crimes.
Document Page
The other factor is having knowledge regarding the various types of cyber-crime activities
present on the internet.
The next factor that is to be achieved is the solutions for solving the cyber-crime cases
that would help the people from getting saved from these activities (Yar and Steinmetz,
2019).
Expected outcomes and significance
The expected outcome of the above article is to get the proper solutions related to the cyber-
crime and keeping the people aware of such activities so that the prior awareness could be
done. The result of the article that is written above helps in providing the knowledge of many
methods and techniques that is related to cybercrime and many methods through which the
issue can be resolved. The article also contains the activities that are observed in various
countries and the methods that are adapted to resolve cybercrime in a different country are
discussed in the above report (Santos, 2016).
Document Page
Conclusion
The above report contains the detailed study regarding the cybercrimes and various issues are
mentioned in the report that can be encountered because of the cyber crimes. Some of the
crimes are discussed in detail that is faced most commonly across the world and needs some
major prevention so as to keep the details and information safe of every individual. By doing
the above assessment the understanding of the cybercrime is clear and in-depth understanding
is achieved.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Yar, M. and Steinmetz, K.F., 2019. Cybercrime and society. SAGE Publications Limited.
Santos, R.B., 2016. Crime analysis with crime mapping. Sage publications.
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism.
Prentice Hall Press.
Das, S. and Nayak, T., 2013. Impact of cyber crime: Issues and challenges. International
journal of engineering sciences & Emerging technologies, 6(2), pp.142-153.
McQuade, S.C., 2006. Understanding and managing cybercrime. Boston: Pearson/Allyn and
Bacon.
Frank, I. and Odunayo, E., 2013. Approach to cyber security issues in Nigeria: challenges and
solution. International Journal of cognitive research in science, engineering and
education, 1(1).
Kolodzinski, O., 2002. Cyber-insurance issues: Managing risk by tying network security to
business goals. The CPA Journal, 72(11), p.10.
Mohammed, L.A., 2011. Use of biometrics to tackle ATM fraud. In Proc. 2010 International
Conference on Business and Economics Research (Vol. 1).
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]