Computer Crime, Can It Be Stopped?

0

Computer Crime and My Personal experience

I decided the theme of the research of computer crimes on the Internet, because I, like many consumers, pay bills, shop and various other types of personal and business transactions via the Internet. Two years ago, my credit card was stolen mobile phone after paying the bill online. So the question is whether or not computer crimes can be stopped, it, I constantly have to worry about it and think.

Let me first define computer crime: computer crime and cybercrime, is any crime with a computer and a network. The computer can be used in the Commission of a crime, or his purpose” (Wikipedia). If I were asked two years ago whether or not I thought computer crimes could be stopped, I would have answered the question, according to my negative experience and the answer would be no.

But I think it depends on the type of cybercrime. For example, if someone uses a computer to obtain illegal financial information, sell drugs, abuse or advertise for sex, to find and stop these people one question tracking CPU a unique identification number and the location of the unit and either to block or remove the website, it would be. Depending on the severity of computer crime, the perpetrator could be arrested and convicted.

Today there are various types of security software for web sites, detects suspicious activity and helps you to filter spam. However, if the crime is the heel, whether it is because to check the hacker’s intention is to make his/her hacking skills, hacking application or to destroy a specific site, this kind of cybercrime proves to be more difficult to prevent. Hackers, as a rule, highly qualified specialists.

Also, every time advanced malware available, it’s a matter of time before hackers explore the possibility of breaking the encryption and hacking sites. “Most companies encounter multiple cyber attacks every day, many of the public is not known and many unknown to the company itself” (Walters, Riley).

Cyber attacks on U.S. companies in 2014

In 2014, an alarming number of large corporations experienced website-hacking hackers consumers access to personal information. Today, rest and security implementation of security measures to prevent injury became a problem.

Just to have an idea about how far the crimes hack widespread, here is a list of companies that were hacked in 2014: Target, Neiman Marcus, Michael’s, Yahoo Mail, Aaron Brothers, AT&T and eBay. Federal Bureau of Investigation, “the wave of the recent data theft from reputable companies such as JPMorgan Chase, Home Depot, and Target raises questions about the effectiveness of the private sector, information security”. FBI Director James Comey stated that “There are two kinds of big companies in the United States.

There are those that have been hacked… and those who don’t know that you were hacked” (FBI). This is part of the Mr. Comey, he says a statement where, “those who do not know.” I find it strange. What awaits in the shadows of the unknown? Maybe it’s an attack on the entire human resources database administration or system that pays benefits? What happens cybercrime was to destroy the new secret weapon for the war, some countries in the attempt, the economy and other. Today, these are all great opportunities. We should stop e-Commerce on the Internet?

Fortunately, or unfortunately, the Internet is to learn how people communicate, shopping, entertainment, and information exchange. The convenience outweighs any questions concerning computer crime.

Bullying

Another type of cyber bullying. It was shown that is often found in young people under the age of 18 years. This usually happens in social media, where people after private information, stem, or consistently negative banter on other people thus to embarrass, ruin, fear and in some cases harm.

It is not possible to determine all of the Stalker, because often the information is published anonymously and quickly distributed. Deleting information has proved to be challenging. Websites that are often used for cyber-bullying include Facebook, Twitter, Instagram and other sites, promotion of sociability as his center of gravity. The fact that bullying did not occur negated through technology the terrible consequences of his sacrifice. It will be assumed that the children, cyber-bullying is more prone to alcohol and drugs, skipping school, experience in-person bullying, not wanting to attend school, receive poor grades, lower self esteem and have more health problems,” research via the National Center for Education Statistics, Bureau of Justice Statistics (Department of health).

U.S. accusations of computer crimes

The Ministry of justice website contains 2015 press release arrests and conviction of cybercrime. Some of the beliefs are: “CMU student pleads Guilty to develop malware to Sell it on hacker forum; mediation music piracy sites plead Guilty to Criminal copyright infringement, a Former state Department employee Accused of computer hacking and cyber; new York man Admits to sending spam, to Nine people convicted of the Largest Known computer Hacking And Securities Fraud Scam; and Estonian National pleads Guilty In Federal court in Manhattan charges for cyber-fraud regulation That has Infected millions of computers around the World” (FBI).

The above list represents only a small proportion of cybercrime that are listed on the website. Crime law enforcement agencies in many States in the US have their own stories about the arrest and condemnation against cybercrime.

Conclusion

The Internet is a global network run wild, no control from the government. The intention to allow the Internet, the source of freedom, and the exchange of information without government regulation.

However, because of the growing use of the Internet in providing consumer goods and services, governments around the world are working together in search of the one end cybercrime.

The government cannot violate the laws of the Internet could interfere in the control of other governments should Therefore find a way to come together, and if there are differences in the direction needed for the treatment and prevention of cybercrime.

Share.

Leave A Reply