Evaluation of different types of internet crimes
Occurrence of new crimes in connection with development of new technologies and computerizations. The review and the characteristic of the most widespread internet crimes, ways of struggle against them. Methods of protection of the personal information.
Рубрика | Иностранные языки и языкознание |
Вид | эссе |
Язык | английский |
Дата добавления | 15.03.2012 |
Размер файла | 15,3 K |
Отправить свою хорошую работу в базу знаний просто. Используйте форму, расположенную ниже
Студенты, аспиранты, молодые ученые, использующие базу знаний в своей учебе и работе, будут вам очень благодарны.
Размещено на http://www.allbest.ru/
Evaluation of different types of internet crimes
internet crime protection information
With the evolution in the field of computerization and the rapid development of technology, we cannot only see new kinds of crimes, but also changed the nature of them, as a result of growing technological capabilities. Of course, we need a practical investigation of these crimes, most of which were committed by private companies, along with an assessment of risk for certain businesses. Though the investigations are replenished with new crimes and evidence, the majority of routine cases remain unsolved. The purpose of this essay is to identify types of internet crimes, and suggest ways of protection against internet crimes.
Initially, talking about internet crimes. The Internet has opened many opportunities for hackers and a wide variety of problems for the services of law enforcement. The astonishing thing is: The size of the Internet market and its relative simplicity; High speed; Low prices, which contribute to the successful development and prosperity of fraud in the global network. Victims will never be able to see or even talk to the attackers. (http://www.usa.gov/)
Secondly, fraud associated with credit cards. Credit card fraud is the most common type of Internet crime. The main reason is that 95% of Internet transactions are implemented by using credit cards. Due to this there have been created many different methods of cheating in this area. The most popular method of obtaining information about credit cards is the use of special programs for the determination of security numbers of credit card. Although this is the most popular method up-to-date, the number of Internet crimes is increasing, and the attackers are constantly improving their old methods and create new ones, as professionals involved in the trade, create different procedures of dealing with them.
In addition, stealing credit card numbers - it is the most simple and easy way to commit internet crime. Most cases of theft of credit card numbers, commonly used on the Internet, however, occur in conventional stores. Cases of theft of card numbers over the Internet are much less. Anyone can pick up a cashier's check; they can also be waiters that bring you a bill. In addition to credit card numbers, criminals can also obtain personal information about you. Using this and number of your credit card, fraudsters can make expensive online purchases. Programs to determine the credit-card numbers are free and easily accessible on the Internet. These programs are used by hackers to find the card number using the special algorithmic techniques. Obtained credit card numbers can be easily used for a number of online transactions, including legal and illegal purchases. (http://www.ic3.gov)
Thirdly, e-mail fraud. Email fraud is associated with spam, which bombarded Internet users with fake commercial or personal email addresses, advertising the specific products or some investment plans. Thousands of email messages can be sent over a relatively short period of time. Fraudsters can buy a list of email addresses from other public companies. They also can use widely available software to conduct searches in chat rooms or national or global scale or in a special directory in a short period of time.This method will allow attackers to gather millions of active email addresses, both personal and commercial fit for the perception of certain information.
Also, people who send spam can also get addresses from the membership directory of any Internet service provider. Some attackers use a special program that makes random list of email addresses. Thus, online users can get spam, even if they never leave personal information in a directory or a chat group. Criminals are adapting to advanced computer technologies to improve their operations.
Unfortunately, they baffle the "Web police" which are trying to react to such an action. The "Web police" should create special rules to deal with different categories of computer crimes.They should know all the information in order to get evidence of crime and find the perpetrators. Undoubtedly, the work of "Web police" should be held to a higher level to be able to cope with various aspects of the crimes committed. Government should train and coordinate their activities. Internet service providers can also help in solving crimes through the provision of "Web police" with email addresses of their customers.Online retailers should be allowed to store information on their customers without adequate protection. (http://www.detailshere.com)
To recapitulate, suggestion of some methods to protect your computer and personal information. In today's growing world of technology, if you want to protect your personal information, we must think about the necessary precautions, such as personal data storage and encrypted format, the implementation of a constant review of all actions made on your computer, use strong passwords, regular monitoring activities conducted with credit card and bank account and control over the children. Use of the computer may be limited by setting passwords for important information such as credit card numbers. In addition to these methods it is a special program, called "firewall", to protect your computer from hackers. Firewall can monitor all activities that occur on your computer and restrict access to it. There are many types of computer crimes, such as entry into your system for entertainment, attacking employees of certain companies, viruses and online scams. Computer crimes are still a major problem faced by the internet users. (http://www.icginc.com/)
Made by: Kazybek Bexultan IF SCIENCE group
Personal Tutor: Dean Cooper
Размещено на Allbest.ru
Подобные документы
Development of computer technologies. Machines, which are able to be learned from experience and not forget that they studied, and able to work unassisted or control of man. Internet as global collection of different types of computer networks.
топик [10,3 K], добавлен 04.02.2009The computer systems and unique possibilities for fulfillment before unknown offenses. The main risks and threats to information systems security in the internet. Internet as a port of escape of the confidential information and its damage minimization.
контрольная работа [19,6 K], добавлен 17.02.2011Examination of arguments used by Russia to accuse Ukraine of the catastrophe of the Malaysian Boeing 777. Establishing a worldwide tribunal for investigating crimes perpetrated by the aircraft. Qualification of the tragedy in terms of international law.
статья [34,6 K], добавлен 19.09.2017Definition of concept of slangy language. Consideration of the reasons of occurrence, history of an origin, phonetic peculiarities, morphological characteristics and types of slang (from the Internet, of army, police, money, cockeney rhyming, polary).
курсовая работа [77,9 K], добавлен 06.02.2010The main principles of marketing. The globalization of activity and costs decreasing. The personification of interaction and transition to e-marketing and the problem of e-marketing economic effectiveness. Marketing communications in the internet.
контрольная работа [29,3 K], добавлен 17.02.2011Business English and its characteristic features. Classification of organization cultures. Advice for job seekers. The Internet, fax, E-mail, memo. Social responsibility of business. Money and methods of payment. Stores and consumers. Business in the USA.
учебное пособие [106,8 K], добавлен 12.07.2013Information access and exchange. Cognitively Salient Relations for Multilingual Lexicography. Work in Cognitive Sciences. Transcription and Normalization. Mapping to Relation Types. Clustering by Property Types. Information about synonyms and antonyms.
реферат [24,6 K], добавлен 28.03.2011Concept of Contractions: acronyms, initialisms. Internet Slang. Sociolinguistics, its role in contractions. Lexicology - a Branch of Linguistics. Comparison. Contraction Methods. Formal Writing Rules. Formal or Informal Writing. Concept of Netlinguistics.
курсовая работа [339,2 K], добавлен 01.02.2016Research methods are strategies or techniques to conduct a systematic research. To collect primary data four main methods are used: survey, observation, document analysis and experiment. Several problems can arise when using questionnaire. Interviewing.
реферат [16,7 K], добавлен 18.01.2009Theoretical aspects of relationship between technology and language. Research-based principles of vocabulary instruction and multimedia learning. Analysis of examples of vocabulary learning strategies available on the Internet during the lesson.
контрольная работа [1,6 M], добавлен 11.03.2015