Cybercrime And The Ways We Can Guard Term Paper

PAGES
2
WORDS
774
Cite

¶ … cybercrime and the ways we can guard against them in the workplace. Because the inherent nature of the Internet is stateless and borderless, it is an ideal 'location' to facilitate already-illegal operations. "Telecommunications equipment being used to facilitate organised drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons "and the general dissemination of offensive materials (Grabosky & Smith 1998). Likewise, identity theft has always occurred but it is rendered much easier by the Internet through techniques such as phishing and spoofing. While piracy and copyright infringement also existed pre-Internet, the Internet has made copies much more easily available and of higher quality. "Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many" (Grabosky & Smith 1998). Criminals use the Internet to prey upon persons who are not savvy about sales, investment fraud, or other forms of illegitimate commerce such as 'phishing' for data like credit card numbers and bank numbers via false...

...

Money laundering and tax evasion via Internet shell companies is also common.
Another common type of cybercrime is the theft of telecommunications services. "By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties" (Grabosky & Smith 1998). Interfering with business processes through hacking as a method of extortion, or simply as a prank is also a possibility.

At times, it can feel as if it is impossible to keep up with the rapid changes in technology that make cybercrimes possible. But there are certain, basic procedures every user can take on his or her personal PC or in the workplace. Do not open suspicious emails or download suspicious attachments. Do not respond to requests for credit card numbers or other personal data, even if they allegedly come from a bank or other service provider. Contact the provider via the legitimate website (which will likely say that it will never ask users for personal information via email). Using antivirus protection is necessary, as is encrypting data. And to avoid being an unwitting accomplice to copyright infringement -- if a…

Sources Used in Documents:

References

Grabosky, P. & Smith, R. (1998). Crime in the digital age. Sydney: Federation Press, 1998.

Retrieved: http://www.crime.hku.hk/cybercrime.htm

Hayman, K, Miora, M., & Forbes, A. (2010). Is cybercrime a threat to your business? PC World.

Retrieved: http://www.pcworld.com/article/185763/cyber_crime_business_threats.html


Cite this Document:

"Cybercrime And The Ways We Can Guard" (2013, June 16) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/cybercrime-and-the-ways-we-can-guard-98566

"Cybercrime And The Ways We Can Guard" 16 June 2013. Web.25 April. 2024. <
https://www.paperdue.com/essay/cybercrime-and-the-ways-we-can-guard-98566>

"Cybercrime And The Ways We Can Guard", 16 June 2013, Accessed.25 April. 2024,
https://www.paperdue.com/essay/cybercrime-and-the-ways-we-can-guard-98566

Related Documents

Intrusion Detection Systems: Retail-Based Cybercrime and the Importance of Security Point of Sales Endpoints Systems Retail-based cybercrime and the importance of security Point of Sales Endpoints Systems The recent technological advances have resulted in increased dependability of network-based technology for everyday usage. Points of sales systems have also evolved, and they are now linked to the company's network, which makes them vulnerable to attacks. The number of attacks leveled against POS endpoints

Continental tropical (cT) air masses are hot, dry, unstable at low levels and generally stable aloft (upper-level ridge); they originate in northern Mexico. Continental polar (cP) or continental arctic (cA) air masses are cold, dry, and stable originating over northern Canada and Alaska as a result of radiational cooling. (Oklahoma Climatological Survey, 2004)" The greenhouse effect has been in the news for the last several decades especially with the resulting

Negligent Liability & IT Outsourcing Negligent Entrustment Liability Negligent entrustment is where personally identifiable information is outsourced to an insecure back-office operation (Rustad, 2007). Organizations have an affirmative duty to ensure that data is secure regardless of whether it is in-house or outsourced, or where it gets outsourced to. The liability centers on the companies who have direct liability to consumers and businesses, not just the outsource operation. has international standards for the

Cross Platform Mobile and Web
PAGES 63 WORDS 17284

82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although

Internet Risk and Cybercrime at the U.S. Department of Veterans Affairs Internet Risk Cybercrime Today, the mission of the U.S. Department of Veterans Affairs (VA) as taken from President Lincoln's second inaugural address is, "To care for him who shall have borne the battle, and for his widow, and his orphan." To this end, this cabinet-level organization provides healthcare services through the Veterans Health Administration (VHA) to nine million veteran patients each year.

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of