Monday, December 16, 2013

Write an Essay on Security Issues on Internet or Cyber Crime.

Any crime that is committed using a computer, a network, or hardware device is known as cyber crime. Attacks include keystroke loggers, viruses,  Trojan horses, phishing, theft or manipulation of data or services via hacking or viruses, identity theft, and bank or e-commerce fraud.

More than 9 out of 10 of the world’s emails are fraudulent. No doubt,we have noticed the increased amount of spam . The spam keeps coming because it works . People do click on the messages, fill in their account details, order the fake pharmaceuticals and sign up for bogus work-from-home schemes, and lose
their personal information.

 Phishing attacks, or fake email or other lures that get the consumer to provide confidential data. One creative phishing attack offered Australian tax payers a special printable form to access their refund payments . After the victim entered their sensitive financial information into the form and clicked “Print,” their private data was sent to the cyber criminals .

Modern cyber crime is about money. 78% of online attacks include a financial component and, in fact, 76% of those online attacks include a keystroke logger—a piece of software that silently waits on our computer to record our logins and account credentials and passwords and then ships them off to the crooks, wherever they may be, via the Internet . Next thing we know, our bank account is being emptied and our credit cards are being used fraudulently.


Cyber crimes—harmful acts committed from or against a computer or network—are very dangerous and difficult to control. Existing terrestrial laws against physical acts of trespass or breaking and entering often do not cover their “virtual” counterparts.

To provide self-protection, organizations should focus on implementing cyber security plans addressing people, process, and technology issues. Organizations need to commit the resources to educate employees on security practices, develop thorough plans for the handling of sensitive data, records and transactions, and incorporate robust security technology--such as firewalls, anti-virus software, intrusion detection tools, and authentication services--throughout the organizations' computer systems.

Web pages such as the e-commerce sites recently hit by widespread, distributed denial of service attacks may not be covered by outdated laws as protected forms of property. New kinds of crimes can fall between the cracks, as the Philippines learned when it attempted to prosecute the perpetrator of the May 2000 Love Bug virus, which caused billions of dollars of damage worldwide.

In most countries around the world, existing laws are likely to be unenforceable against such cyber crimes. This lack of legal protection means that businesses and governments must rely solely on technical measures
to protect themselves from those who would steal, deny access to, or destroy valuable information.

(Source - Internet)

No comments:

Post a Comment

I will be glad, if you recall someday that you heard this news from this blog. Do spare some time to leave a comment.