Wednesday, July 17, 2019
 Cybercrim in Society Essay
 Cybercrime With everything in society advancing rapidly, it should be of no surprise that technology is  this instant  utilise to commit crimes a chance uponst  new(prenominal) people. Those crimes include identity theft,  stealing money,  outlaw(prenominal) gambling, and cyberstalking. This paper will  limited review cybercrime and the  releases thither  be from  handed-down crime and it will review the purpose of  ward-heelers. There will  as well as be  collar cases reviewed to help bring light to what  mental of cybercrimes   atomic number 18 being committed around the world.Differences between Cybercrime and Traditional CrimeFor an individual to fully  actualise the  residuum between cybercrime and traditional crime, the individual  inescapably to understand what cybercrime is. The definition of cybercrime is according to Oxford Dictionaries (2014), crime conducted via the  net profit or some other computer vane (cybercrime). Cybercrime is committed by  nags with the goal of fi   nancial gain in min by stealing  individualised  nurture(bank information, credit card information, etc) from individuals. Traditional Crime is a considered crimes against the public. There are  humankindy  opposite categories for cybercrime  yet the  of import  quatern include identity theft, illegal gambling, cyber terrorism, and cyber stalking. Both cybercrime and traditional crime are  supercharged on a state law  take however, there are plenty of  federal laws that  dirty dog be violated through committing cybercrime.The main difference that needs to be known is that when cybercrimes are committed, the crimes are done so from the luxury of a hackers ho use or place of  concern while traditionally crimes are  non. Another difference worth noting is that cybercrime criminals have the ability to commit these crimes from different states, even internationally at some levels. When cybercrimes are committed liken that, it makes it hard to prosecute as the laws may vary from place to    place. That is usually when federal laws are reviewed for a prosecution to happen.Purposes of HackingHacking dates back to the 1950s. This is  want before the birth of the internet. Hacking began as a  method or searching for shortcuts when encountering a computer issue.  concord to Marriam Webster (2014), A hacker is a person who  in secret gets access to a computer system in order to get information,  lawsuit damage (para. Hacker). at once hacking of oftenreferred to a person wanting to cause havoc in a computer or m some(prenominal) computer systems for a  modestness. Hacking has evolved  everyplace the  familys. In the beginning, hacking was often used to prank, cause mischief and curiosity. Hacking  immediately has grown very large and has been categorized into the types of hacking. Although hackers use different methods of accessing unauthorized information, the most common reason for doing such things is for financial gain. Kevin Mitnick vs the USAKevin Mitnick began hacking    at an  primal age of 12. As this age he began  qualification punch cards for the Los Angeles transit authority. Mitnick also  fall in a phone phreak gang which conducted many pranks. The  multitude discovered a modal value to take over the  resound directory assistance and prank incoming callers. The  crowd also changed the status of  family phones to payphone status. A home telephone  drug user would attempt to use the telephone  tho a recording would request the user to deposit twenty cents. The group accessed a San Francisco   run aground company and destroyed files. More than a year later, this crime was unsolved. It was not until a members girlfriend went to the police. This led to the arrest of Kevin Mitnick, age 17, and other members of the group.Mitnicks streak of hacks has landed him in jail  quadruplicate times throughout his hacking spree. At the age of 16, Mitnick accessed a computer manufacturing company and sold their software. He went on the run for several years by a   ccessing companies via computers to  become identity documents. He was not convicted of these crimes. He was  finally arrested for hacking into Nokia and Motorola and convicted. This arrest landed him in jail for four and-a-half years before being brought to trial. Upon his release in 2000, he was restricted from using any  communication theory technology which was more advanced than a  wire home phone. Mitnick contested this ban and won. He now owns Mitnick Security Consulting LLC. The RBS World Pay serversWorldPay is a  wages Card Industry that helps businesses in  allowances processing. WorldPay headquarters is  base in Atlanta, Georgia and have  work outed globally in London, Belfast, Edinburgh, Gateshead, Sweden, Singapore, Montreal and a few other countries. WorldPay  stipend processing service enabled businesses to accept payments from customers from differentpayment types such as, Visa, MasterCard, discover, American Express, debit and gift cards, checks, electronic benefits    Transfer, and direct debit. The WorldPay hacking was considered the most sophisticated attack so far in history. In November 2008, According to Baker, Associated  hole (2012) hackers infiltrated the RBS WorldPay servers and accessed prepaid payroll card numbers, cracked their encrypted  signal flag codes, raised the balances on the cards and distributed dozens of them to a team of people around the world.Within a matter of hours, the same group of hackers hit 2,100  automatic teller machine terminals in 280 cities around the world from the U.S. to Russia.to Italy to Japan. FBI tracked  galvanic pile the hackers by narrowing down their suspects to one man who worked for the company and his name is Oleg Covelin. After he found a vulnerability in the computer  profits that RBS WorldPay uses, he passed the information to Sergei Tsurikov of Tallinn, Estoria who then distributed 44  contrive cards to a team of cashers around the world. The hackers  act to cover their tracks but the FBI t   raced the hackers by using Cyber forensics and also with the help of foreign authorities and international banks. Sergei Tsurikov, Viktor Pleshchuk of St. Petersburg, Russia, and Oleg, Covelin of Chisinau, Moldova and three others from Estonia were indicted in the case in 2009. Three of the main suspects were convicted in Estonia and the other suspects are awaiting sentence.In conclusion, although traditional crime is still around, cybercrime is slowly making its way into society and the advancement of technology is helping that happen. The  besides difference between the two types of crimes is the way they are committed. Hackers will not let anything stop them from achieving the  last goal of successfully hacking a system. With the cases listed and reviewed it is clearly  say that hacking and cybercrimes can be committed by anyone for any certain reason. No one can be sure that their information is completely safe but it is better to take precaution by not putting so much personal    information on the web than it would be to not  fear and end up the victim of cybercrime. Hackers continue to expand their knowledge on the systems to hack so that should  fight society to expand the security for the web.ReferencesBaker, M. (2010). Policeone. Retrieved fromhttp//www.policeone.com/federal-law-enforcement/articles/2187579-FBI-gets-suspect-in-massive-cyber-crime-case/ Busch, A. (n.d.). Why Do People Hack. Retrieved fromhttp//www.ehow.com/about_4673738_why-do-people-hack.htmlHacker. Merriam-Webster.com. Merriam-Webster, n.d. Web. 3 May 2014.http//www.merriam-webster.com/dictionary/hackerMeriwether, D. (1995). Takedown.Retrieved from http//www.takedown.com/bio/mitnick.htmlOrphanides, K. (2011). Top 10 Most Spectacular Hacks. Retrieved fromhttp//www.expertreviews.co.uk/ full general/1285633/top-10-most-spectacular-hacks/2 Oxford Dictionaries. (2014). Retrieved fromhttp//www.oxforddictionaries.com/us/definition/american_english/cybercrime  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.