Assignment 3: The Role of the Internet and Crime
Technologies such as cellular phones, pagers, home computers, the Internet, websites, and palm pilots have added another dimension to crime. That dimension involves increased methods at criminals disposal to commit certain crimes along with increased locations in which crimes can occur. Hackers use to look for fame with a splashy, large-scale attack on a network that made headlines. Today's cybercriminals are quietly taking over vulnerable web sites as part of an elaborate process in the underground economy. A highlighted section is something can change the motivation of hackers. The hackers have moved from hacking attempts that are being done for notoriety to hacking for criminal intent and fraud. While early hackers wanted to make a big splash by attacking as many computers as possible in a show of genius and ability for taking down network, now criminals do not want to be detected. Takeovers are done in a slow, methodical fashion. By not being caught, they can use the systems they have taken over for a variety of purposes. How are cybercriminals working today, and what do you need to know to stay on top with your security strategy. Cybercriminals are sneakier, and quite. Malware infected systems are used as network of bots for a wide variety of inappropriate activities. A program that uses “Bots,” can do denial of service attacks, they can be used to send out spam, and to send out phishing data Internet aided criminal activity
The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very limits of the U.S. Constitution has arrived. The Internet is used to commit various crimes against a person like, transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most...