Essays /

The Role Of The Internet And Essay

Essay preview



Assignment 3: The Role of the Internet and Crime

Strayer Universality
CIS 170

Introduction
Technologies such as cellular phones, pagers, home computers, the Internet, websites, and palm pilots have added another dimension to crime. That dimension involves increased methods at criminals disposal to commit certain crimes along with increased locations in which crimes can occur. Hackers use to look for fame with a splashy, large-scale attack on a network that made headlines. Today's cybercriminals are quietly taking over vulnerable web sites as part of an elaborate process in the underground economy. A highlighted section is something can change the motivation of hackers. The hackers have moved from hacking attempts that are being done for notoriety to hacking for criminal intent and fraud. While early hackers wanted to make a big splash by attacking as many computers as possible in a show of genius and ability for taking down network, now criminals do not want to be detected. Takeovers are done in a slow, methodical fashion. By not being caught, they can use the systems they have taken over for a variety of purposes. How are cybercriminals working today, and what do you need to know to stay on top with your security strategy. Cybercriminals are sneakier, and quite. Malware infected systems are used as network of bots for a wide variety of inappropriate activities. A program that uses “Bots,” can do denial of service attacks, they can be used to send out spam, and to send out phishing data Internet aided criminal activity

The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very limits of the U.S. Constitution has arrived. The Internet is used to commit various crimes against a person like, transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most...

Read more

Keywords

-3 /about /ccpolicy.html 1.2 1.explain 12 170 1999 2 2.provide 2003 2004 2006 2011 2013 3 3.identify 4.describe 5.use 50 6 abet abil abl abnorm abus accesnovemb access account accus acquir across act action activ ad addit address adequ affect aid aim al al-qaeda allow along also amount anonym anoth anti anti-phish apa app appear area arm arriv aspect assign associ attack attempt auction bank base bay becom benefit best better big birth blackboard blackmail bomb bomb-mak bot bring browser busi caeti call card carri case categori caught caus cds cellular center certain chang chapter chat check child child-pornographi children cis clandestin class clear click clickabl clone closer code collar commerci commit common communic comput conceal concern concis confid consid consist constitut consum contain contamin convent counterfeit countri cours cover crash creat credit crime crimin criminolog critic crucial cult cyber cybercrimin damag data date decad declin denial deploy destroy detail detect develop devic differ digit dimens disguis dispos disrupt dissemin distanc distribut divulg dollar done doubl drive driver due e e-bay e-mail earli economi edit educ effect effici effort eighti elabor electron els email enter equip eric estim europ evalu even everyth exampl execut expedit explain exploit export exposur express extens extremist fail fake fall fals fame fashion feel file financi follow font form format forum fraud fraudul frighten fritsch full function gain gather generic genius good grade great greatest group hack hacker hall handl harass harm headlin highlight histori holt home howev ident ideolog illeg implement import inappropri inc inch incid includ increas indec individu infect inform instruct instructor intellectu intend intent internet introduct investig involv io issu j john justic k keystrok know knowledg known larg large-scal last launder learn least legitim length licens liederbach like limit link livelihood locat long look loper loss lure made mail main make malici malwar mani manner margin massiv materi may mean measur mechan media melissa method migrat mileston million minor mobil monetari money motiv move must name natur near necessari necessit need network new non non-digit notic notorieti nov number obscen obtain occur offens often one one-inch onlin open organ outbreak outcom page pager palm paper parallel part password past pearson pearson/prentice peopl perform person personnel pharmaceut phish phisher phone physic pilot piraci place plan play pleas plethora point poison polici popular pornographi pose possibl post potenti prepar pretend prevent procedur process professor program propaganda proper properti prosecut protect provid pure purpos qaeda qualiti quiet quit r radic recip recoveri recruit recurr refer refin relat releas religi remov replic report requir research resourc retriev review rippl rise river robert robust role roman room rubric saddl safe safeguard scale scheme school school-specif second section secur send sensit serious servic sexual share show side signific site size slow sneakier social solicit someon someth sophist sourc space spam specif splash splashi spread stalk stalker start state stay steal strategi strayer stride student style submiss submit subsequ summar suppli system take taken takeov target taylor technic technolog telecommun telephon terror test theft therebi therefor thoma threat three throughout time titl today togeth tool top topic tortur toward tradit traffick train transmiss trick trustworthi type u u.s underground univers updat upon upper url usb use user usernam util varieti various vast victim view virus vulner w want web websit week well white white-collar wide widespread within without work world worldwid worth would write written www.antiphishing.org www.crime-research.org www.crime-research.org/about www.cybercrime.gov www.cybercrime.gov/ccpolicy.html year