Wednesday, May 6, 2020

Computer Behaviours and Topologies

Question: Discuss the Different types of computer behaviours and topologies, Comparison of the similarities between different types of computer criminal behaviour and topologies and Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies? Answer: Introduction According to Gostev (2012), the development of digital technologies represents an opportunity for any business to provide new tools for communication. The online activities become central to the way people live. However, this internet represents opportunities to cyber criminals. Computer crime is an act that is performed by the computer user, sometimes referred to as hacker that browses the companys private information illegally (Greenbaum, 2015). Additionally, computer crime includes the crimes that are to be conducted using internet such as hate crimes, online fraud, thefts of bank account details; these are considered to be computer or cyber crimes when these illegal activities are to be dedicated through the use of computer (Walker-Osborn McLeod, 2015). Different types of computer behaviours and topologies According to Prasanthi (2015), at a basic level, the types of computer behaviour are divided into the following categories, but there is no such universally accepted typology of the Internet crimes. Online Assault: It involves the violence that is raised through internet such as the threats that results in emotional response on the victim. The online assaults are of different types such as cyber bullying, online sexual exploitation of children etc. Cyber bullying occurs when the minors use the internet devices to tease as well as harass other minors (Henson, Reyns Fisher, 2011). The online sexual exploitation occurs when a child by using internet; establish some online relationships with other children. Social networking sites are the place for the offender to make such type of crime (Patel, 2012). Online Fraud: It uses the online sites in an effort to profit financially. Such types of online fraud are sale fraud, inheritance scams as well as phishing etc. In sale fraud, the selling of products on the online sites is misrepresented by the seller of the products (Walker-Osborne Price, 2011). Therefore, after the payment of the products, they never delivered those products to the buyer (Keen, 2011). Such that in inheritance scams, a criminal contacted the victim and told that they win some lottery online of a large amount (Al-Agaga, 2012). Then the victim is being instructed to pay an amount to initiate the process to deliver the money. In phishing, the criminal poses as lawful business includes credit card Company, online retailer to convince the victim to give the information related to password; bank details (Sood Enbody, 2011). Sometimes, it also involves spoofed emails to do the fraud. Such schemes are used to take the personal information of the victim to profit financial ly by withdrawing funds from the account of that victim (Holt, 2014). Cyber extortion: It occurs when a website as well as computer system is endangered with repeated denial of service by the malicious hackers. These hackers claim for money in return of promise to stop the attacks and promise to offer protection (Barn, 2012) Online theft: It is mainly used to steal the information as well as money from the owner. This type of crime often involves the misuse of the victims personal information for the purpose of committing theft (Vijaya Geeta, 2011). It consists of online piracy to share intellectual property by using the Internet; the problem of piracy is being compounded by peer-to-peer contribution of files throughout which the resources can be distributed illegally (Edwards, 2014). Online Intrusion: It involves the use of internet to infect the space of other individual, computer systems (Takieddine Sun, 2015). It is the act that an individual attempt to surpass a computer systems safety measures is referred to as hacking. Viruses are designed to spread throughout the whole computer to reduce the efficiency of the system (Raiu, 2012). Comparison of the similarities between different types of computer criminal behaviour and topologies The similarities between different types of computer criminal behaviour and topologies are that all the computer crime is being unauthorized access to computer systems or any networks (Caldwell, 2013). Most of the crime includes the stealing of information stored in the computer hard disks or detachable storage media. Normally, this kind of theft is done by getting hold of access of the login id as well as password of the victim (Cornford, 2011). This is one of the reported cases of cyber crime in all over the world. The crime is done against any organization, individuals, individual property (Nuredini, 2014). The offenders focus on the financial gain such as the use of phishing emails to gain access to details of the bank account. At the time of investigating the threat, the law enforcement is challenged while tracing the actions to the source (Barmaki, 2012). In some instances, technological devices are served as repositories for evidence of the cybercrime. All these cyber crimes w ould be harmful for the organization in the area of financial property as well as transfer of data within the organizations (Bednar, Katos Hennell, 2014). Comparison of the difference between different types of computer criminal behaviour and topologies Mostly, computer crimes focus on the financial gain but in case of child exploitation, the motive is not always profit. The motive may include intellectual curiosity or challenge, revenge, gaining some respect in online communities etc. The difference between a cyber attacks to commit crime as well as commit terror is found in the intension of the attacker (Mitchell Chen, 2014). Online frauds as well as online theft are different from each other. Fraud is a lie, if someone allows believing something that is not true and the victim are being fraud. Theft is losing of money from computer crime. Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies Financial frauds as well as identify theft are conducted by the hackers to evolve into serious threats to the financial services industry and any organization (Vadza, 2011). According to computer crime and security survey, these two are the worlds most cyber crime threat. Most of the organizations are benefited from understanding the different computer criminal behaviour and topologies (Farrington Ttofi, 2014). From there understanding, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that there is no chance of suffering any data loss in case of hacking (Hrnle, 2012). The company should avoid sending the credit card number to any site that is not safe. The organization must use the latest as well as updated antivirus to prevent their computers data against the virus attacks; and use a security programme to give control over cookies (Patel, 2012). An organization should ensure a security awareness that prevent the attack and make the attackers think twice before committing any cyber crime (Hua Haughton, 2012). Psychological screening is an extreme step that should be done before the hiring of employees in an organization (Sahu, Maheshwari Sahu, 2015). Most of the organizations are benefited by the further research in psychological profiling of the hackers (Kumar Mittal, 2012). Therefore, modelling behaviour can be assisted and it is predictive in nature; providing a criminal justice system as well as information technology industry to prevent the unauthorized use of data (Payne Hollin, 2014). Although, various qualitative data exist to build the profile of the individuals that may fit the psychological model of the cyber crime (McIntyre, 2014). Conclusion The advancement of technology such as Internet provides both the individuals as well as organizations with a mean to commit crimes; therefore millions of people are affected by online crime every day. The computer crime is becoming one of the most threatening crimes for both law enforcement as well as the public. These crimes are hate crimes, internet fraud, thefts of credit card account, and telemarketing fraud, these are measured to be computer or cyber crimes when the illegal actions are to be committed throughout using of both computer and internet. Online assault is the crime that involves the crime of harassment, threats of violence etc. Online fraud or theft is the use of dishonesty as well as violate of confidence online to profit financially. Online intrusion involves using of Internet to damage other individuals computer programs. Therefore, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that the individual may not suffer from any data loss in case of hacking. Reference List Al-Agaga, A. (2012). FACTORS THAT INFLUENCE E-LOYALTY OF INTERNET BANKING USERS. Ijecs, 3(2), 297-304. doi:10.7903/ijecs.1097 Barmaki, R. (2012). Book Review: Computer Crime, Investigation, and the Law. Criminal Justice Review, 37(1), 132-133. doi:10.1177/0734016811405286 Barn, D. (2012). Insuring cyber-assets. Computer Fraud Security, 2012(9), 5-8. doi:10.1016/s1361-3723(12)70090-8 Bednar, P., Katos, V., Hennell, C. (2014). On the complexity of collaborative cyber crime investigations. DEESLR, 6(0). doi:10.14296/deeslr.v6i0.1894 Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud Security, 2013(7), 5-10. doi:10.1016/s1361-3723(13)70062-9 Cornford, A. (2011). Criminalising Anti-Social Behaviour. Criminal Law, Philosophy, 6(1), 1-19. doi:10.1007/s11572-011-9134-9 Edwards, C. (2014). Ending identity theft and cyber crime. Biometric Technology Today, 2014(2), 9-11. doi:10.1016/s0969-4765(14)70033-5 Farrington, D., Ttofi, M. (2014). Criminal careers in self-reports compared with official records. Criminal Behaviour And Mental Health, 24(4), 225-228. doi:10.1002/cbm.1932 Gostev, A. (2012). Cyber-threat evolution: the year ahead. Computer Fraud Security, 2012(3), 9-12. doi:10.1016/s1361-3723(12)70052-0 Greenbaum, D. (2015). Cyber crime 2.0. Science, 348(6231), 193-193. doi:10.1126/science.aaa7298 Henson, B., Reyns, B., Fisher, B. (2011). Crime and Criminal Behavior. Retrieved 12 July 2015, from Holt, T. (2014). Cyber war will not take place, by Thomas Rid. Global Crime, 15(1-2), 206-208. doi:10.1080/17440572.2014.884235 Hrnle, T. (2012). Criminalizing Behaviour to Protect Human Dignity. Criminal Law, Philosophy, 6(3), 307-325. doi:10.1007/s11572-012-9177-6 Hua, G., Haughton, D. (2012). A network analysis of an online expertise sharing community. Soc. Netw. Anal. Min., 2(4), 291-303. doi:10.1007/s13278-012-0047-y Keen, A. (2011). Tracking online fraud across the globe. New Scientist, 211(2831), 62. doi:10.1016/s0262-4079(11)62358-0 Kumar, P., Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal Of Technoethics, 3(1), 43-52. doi:10.4018/jte.2012010104 McIntyre, L. (2014). Cyber-Takings: The War on Crime Moves into the Cloud. Pittsburgh Journal Of Technology Law And Policy, 14(2). doi:10.5195/tlp.2014.148 Mitchell, R., Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. CSUR, 46(4), 1-29. doi:10.1145/2542049 Nuredini, A. (2014). CHALLENGES IN COMBATING THE CYBER CRIME. Mediterranean Journal Of Social Sciences. doi:10.5901/mjss.2014.v5n19p592 Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), 28-30. doi:10.15373/22778160/january2014/11 Payne, K., Hollin, C. (2014). Alexithymia, Asperger's syndrome and criminal behaviour: a review. Journal Of Criminal Psychology, 4(2), 155-162. doi:10.1108/jcp-11-2013-0030 Prasanthi, M. (2015). Cyber Crime: Prevention Detection. International Journal Of Advanced Research In Computer And Communication Engineering, 45-48. doi:10.17148/ijarcce.2015.4311 Raiu, C. (2012). Cyber-threat evolution: the past year. Computer Fraud Security, 2012(3), 5-8. doi:10.1016/s1361-3723(12)70051-9 Sahu, B., Maheshwari, D., Sahu, N. (2015). Simulation Model for Cyber Crime Reduction. International Journal Of Computer Applications, 115(21), 20-22. doi:10.5120/20275-2693 Sood, A., Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud Security, 2011(7), 11-16. doi:10.1016/s1361-3723(11)70073-2 Takieddine, S., Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research And Applications. doi:10.1016/j.elerap.2015.06.001 Vadza, K. (2011). Cyber Crime its Categories. IJAR, 3(5), 130-133. doi:10.15373/2249555x/may2013/39 Vijaya Geeta, D. (2011). Online identity theft an Indian perspective. Journal Of Financial Crime, 18(3), 235-246. doi:10.1108/13590791111147451 Walker-Osborn, C., McLeod, B. (2015). Getting Tough on Cyber Crime. ITNOW, 57(2), 32-33. doi:10.1093/itnow/bwv042 Walker-Osborne, C., Price, J. (2011). The War on Cyber Crime. ITNOW, 53(6), 30-31. doi:10.1093/itnow/bwr061

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.