Verified Document

Cybercrime And The Ways We Can Guard Term Paper

¶ … cybercrime and the ways we can guard against them in the workplace. Because the inherent nature of the Internet is stateless and borderless, it is an ideal 'location' to facilitate already-illegal operations. "Telecommunications equipment being used to facilitate organised drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons "and the general dissemination of offensive materials (Grabosky & Smith 1998). Likewise, identity theft has always occurred but it is rendered much easier by the Internet through techniques such as phishing and spoofing. While piracy and copyright infringement also existed pre-Internet, the Internet has made copies much more easily available and of higher quality. "Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many" (Grabosky & Smith 1998). Criminals use the Internet to prey upon persons who are not savvy about sales, investment fraud, or other forms of illegitimate commerce such as 'phishing' for data like credit card numbers and bank numbers via false...

Money laundering and tax evasion via Internet shell companies is also common.
Another common type of cybercrime is the theft of telecommunications services. "By gaining access to an organisation's telephone switchboard (PBX) individuals or criminal organisations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties" (Grabosky & Smith 1998). Interfering with business processes through hacking as a method of extortion, or simply as a prank is also a possibility.

At times, it can feel as if it is impossible to keep up with the rapid changes in technology that make cybercrimes possible. But there are certain, basic procedures every user can take on his or her personal PC or in the workplace. Do not open suspicious emails or download suspicious attachments. Do not respond to requests for credit card numbers or other personal data, even if they allegedly come from a bank or other service provider. Contact the provider via the legitimate website (which will likely say that it will never ask users for personal information via email). Using antivirus protection is necessary, as is encrypting data. And to avoid being an unwitting accomplice to copyright infringement -- if a…

Sources used in this document:
References

Grabosky, P. & Smith, R. (1998). Crime in the digital age. Sydney: Federation Press, 1998.

Retrieved: http://www.crime.hku.hk/cybercrime.htm

Hayman, K, Miora, M., & Forbes, A. (2010). Is cybercrime a threat to your business? PC World.

Retrieved: http://www.pcworld.com/article/185763/cyber_crime_business_threats.html
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now