Cyberspace Crime

The use of the internet has become too important to daily living and business. The development of technology has made it possible for people to effectively use the internet to build tools like communication websites. The use of computers has transformed the world into a global community where it is simple to send and receive information from any location quickly, enhancing everyone's ability to live and work. For instance, we may be able to send an email from one continent to a recipient on another continent with just the press of a button. Similarly, it's easy to learn what is trending in any part of the world by just visiting the major social media platforms such as Facebook, Twitter, and LinkedIn (Nye, 2012). However, as the adage goes, every yin has its yarn, these advancements have also resulted in rising of negative issues associated with information technology. An example is the social media burying and threats, commonly referred to as cyber-attacks which have been proved to be a consequence of vast innovations and developments in the field of information technology.


Cybercrime and its target areas


According to Phillipe Baumard, cyber-crime refers to an unlawful use of numeric, software, and electronic capabilities to obtain public or private information without the owner’s consent (Baumard, 2014). On the other hand, cyber attackers are people who are well competent with technology and therefore find it easy to cybernetic, hack the internet, shared data and networks without the consent of the owner. Their primary target is those individuals who are poorly versed in technology or those that are ignorant of deceptive instruments available on the internet, therefore, exposing their data to unauthorized access (Baumard, 2014). When we consider the extent to which human antagonists have become tactful and intelligent, there is no doubt that transmission of sensitive personal credentials or information without putting proper security measures in place makes this process vulnerable to attacks (Nye, 2012). Cyber attackers take this to their advantage and can launch crimes directed to various parties.


Firstly, there are cyber-attacks against individuals. This aspect manifest through frequent harassment to target persons and forms what we commonly call cyber-stalking (Abbhas, 2014). In this case, cybercriminals target, bully, and threaten victims by issuing death threats, disturbing phone calls or sending of letters and emails persistently to them. These criminals usually use social media and electronic devices that can convey messages and voice calls to achieve their ill motives. According to research, those individuals who fall victim to this kind of cybercrime are those who have been in intimate relationships with the offenders (Abbhas, 2014). The offenders usually use false accounts or platforms where they can use ‘remails' with anonymous identities, or hide their device IP addresses to strip off identification.


Secondly, cyber-attacks can be channeled towards an individual’s properties. In this scenario, cyber thieves mainly access personal systems illegally and steal or sell away their credit card numbers (Grobosky, eds). Moreover, they can deceive a victim and be provided with access to their financial accounts. The most targeted category under this section in the violation of intellectual property rights because the information that pertains to computer programs, databases can be pirated. For a couple of years, companies such as Microsoft and eBay have been at the epicenter of this menace where the attackers aim at breaching their security systems. In fact, piracy of copyrights is one of the most common cyber offenses in most parts of the world, and this act seems to be deep rooted with no hope of eradication soon (Grobosky, eds).


Besides, there have been cases of cyber-attacks directed towards a particular community or nation. This form of cybercrime is mostly used by terrorists and terrorist groups to convey inaccurate and misleading information to a target group with the aim of winning their support. Similarly, these groups can utilize the internet to spread propaganda to arouse misunderstanding and resistance between citizens of a given country and the government in power. By the use of the internet, terrorists are capable of disrupting military telecommunication networks through hacking their computer systems. Cyber-terrorism mostly target nations such as USA, Britain, France, and China which utilize sophisticated computer systems during military operations in the sea, space, and air (Nye, 2012).


One major factor that has played a part in spreading cybercrimes is the availability of hack networks and public internet terminals at meager costs. Another factor is that cybercriminals can commit cybercrimes from any part of the world and this makes tracking them difficult. So far millions have been lost without discovery, and trillions were stolen without detection due to the master cybercriminals existing today (Thomas, 2013). The likelihood of continuing this trend is high since cybercriminals are inventing and modifying illegal tactics on a daily basis, therefore making it hard to stop their malicious acts. As time continues, these cases are likely to escalate due to complexity and sophistication of the technologies they are using. A perfect example of this can be illustrated using the Stuxnet virus that infected the Iran's nuclear programs and destroyed several of their centrifuges (Nye, 2012).


However, some remedies can be used to counter these threats. First individuals must avoid disclosing personal and financial credentials to third parties. There is also need for more secure methods to protect international and government business transactions. For instance, implementation of the laws enacted by the 112th Congress aimed at improving the cybersecurity in the United States can assist in safeguarding the security of critical infrastructure (CI) of the U.S systems (Fischer et al., 2013). These laws define a framework of dealing with cases associated with cyber-terrorism, cyber-spying, cyber-hacktivism, cyber-warriors as well as cyber theft since they pose a severe threat to the security of their CI assets (Fischer et al., 2013). Similarly, computer crime investigators should also test the safeties of their military systems. Last but not least, there should be consistent revision and updating of cyber laws to deal with cybercrimes in the new world.


In conclusion, it is challenging to eliminate cybercrimes today. However, the attacks can be reduced or prevented using joined efforts by individuals and the government. This process involves the adoption of an elaborate technical and human power capable of launching or responding to cyber wars. Also, internet users should ensure that they enable a two-factor authentication process in all of their accounts as well as avoid using the same password for logging in to their internet accounts (Reyns, 2013). Careless downloading or installing of an application from the internet can allow malicious people to gain access to one's personal information. Last but not least, individuals should restrict themselves from committing cybercrimes through proper use of internet and technology.


References


Abbhas, S. &. (2014). Cyber Space and Cyber Crime. Academike Articles on Legal Success.


Baumard, P. (2014, Spring ). The Behavioral Intelligence Paradigm Shift in Fighting Cyber-Crime: Counter-Measures, Innovation, and Regulation Issues. International Journal on Criminology.


Fischer, E. A. (2013, March 1). The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress . Congressional Research Service.


Grobosky, P. N. (eds). Crime in cyberspace, in Phil Williams & Dimitri Vlassis , 197-207.


Nye, J. (2012, April). Cyber war and peace: Greater dependence on networked computers and communication leaves the US more vulnerable to attack than others. Aljazeera.


Reyns, B. W. (2013). Security in a digital world: Understanding and preventing cybercrime victimization. Security Journal, 26(4), 311-314.


Thomas, R. (2013). Cyberwar and peace. Hacking can Reduce Real-world Violence.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price