Cyber-crime: Do you have any concern? Part #1steemCreated with Sketch.

in #crime7 years ago

What is Cyber Crime?

image.png

Generally, “Cybercrime” means illegal acts, the commission of which involves the use of information and communication technologies
The new definition proposed in SA law – Electronic Communications and Transactions Amendment Bill, 2012 (26 October 2012) states:
“cyber-crime” means any criminal or other offence that is facilitated by or involves the use of electronic communications or information systems, including any device or the Internet or any one or more of them.
The term Cyber-crime, although widely used in the same context over the past two decades, does not have a precise or universal definition. Due to the varying scenarios and environments, it varies between jurisdictions and differs largely based on the perceptions of those involved.

Variations of Definitions

Dictionary.com

Criminal activity or a crime that involves the Internet, a computer system, or computer technology.

Encyclopædia Britannica

Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends...

LawBrain

Cybercrime encompasses criminal actions that target computer, internet, or network utility, damaging functionality or infiltrating systems and processes.

Oxford Dictionaries

Crime conducted via the Internet or some other computer network.

Wikipedia

Computer crime, or cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
image.png

How does it?

  1. Cyber Crime
    >Personal purpose.
    >Property and money $$$.
    >Political
  2. Access Point Attacks
    > Unpatched or outdated network software.
    > Obvious, old, or weak passwords.
    > Security that is poorly defined or not well-defined.
    > Having hosts running services that are unnecessary or not secured, such as FTP.
    > Having firewalls with several holes.
    > Having information leaked through finger, telnet, gopher, and other similar services.
    > Software being installed on a network without approval of the Information Systems
    department.
  3. Negligence
  4. Confidential Information
  5. Putting Your Life on the Internet
  6. Child pornography
  7. Viruses, Trojans, and Worms

Process

image.png

3. Why it occurs?

Cyber-attacks are hitting the headlines on a daily basis and a lot of effort goes into both preventing them and dealing with the consequences when they have happened. Understanding the motivation behind attacks can help organizations understand more about the risks they face so that they can tackle them.
Continued...

Coin Marketplace

STEEM 0.22
TRX 0.24
JST 0.038
BTC 94692.02
ETH 3236.92
USDT 1.00
SBD 3.29