Frostburg State University
Cyber Crime
COSC 631 –Web Development & Programming II
By: Thanuja Gonugunta
July 31, 2015
Table of Contents
1.0 Introduction
1.1 Cyber Crime and its Origin
1.2 Typology of Cyber Crime
1.3 Types of Cyber Crime
1.4 Impact of Cyber Crime
2.0 Concepts of Cyber Security in Cyber Crime
2.1 Cyber Security
2.2 Types of Cyber Security
2.3 Cyber Crime Prevention Strategies
3.0 Web Application security for preventing cyber crime
3.1 Declarative Security
3.2 Program Security
4.0 Web Application Vulnerabilities
4.1 SQL Injection
4.1.1 Blind SQL Injection
4.1.2 Mitigation of SQL Injection
4.2 Cross Site Scripting
4.2.1 Mitigation of css
5.0 Cyber Crime Statistics
6.0 Company and Individual Responsibility
…show more content…
Copyright related offences such as copyright infringements and related rights.
1.3 Types of Cyber Crime
There are many types of Cyber Crimes. The most common Cyber Crimes are: Hacking, Theft, Cyber Stalking, Identity Theft, Malicious Software and Child Soliciting and Abuse.
Hacking: Hacking is a type of crime which involves gaining unauthorized access to a computer and changing the system in such a way as to permit continued access without the knowledge or approval of the systems owners.
Theft: Theft occurs when a person violates copyrights and downloads movies, music, software and games. There are peer sharing websites that encourages software piracy and many of these peer sharing websites are targeted by the FBI.
Cyber Stalking: Cyber Stalking is the use of electronic communications to harass or threaten someone by sending e-mails.
Identity Theft: Identity theft is a major problem with people using the internet for banking services and cash transactions. It results in major financial losses for the victim where the criminal accesses data about a person’s personal information or sensitive information to siphon the
…show more content…
They are used to gain access to a system to steal data or cause damage to software present in the system.
Child Soliciting and Abuse: It is a crime where criminals solicit children through chat rooms for the purpose of child pornography.
1.4 Impact of Cyber Crime
The world has become a global village and therefore many activities like education, business, relationship formation and many other aspects relating to humans are done over internet and with cyber-crime these aspects of human have been threatened and in some cases victims lose a lot of money mainly in the e-commerce field. The effect of cyber bullying has caused many individuals to commit suicide. Loss of private data has been witnessed at the organizational and individual level causing the victims great losses when they cannot recover the data.
2.0 Concepts of Cyber Security in Cyber Crime
2.1 Cyber Security
Cyber Security is the protection applied to information, computers, computer networks, information stored therein from unauthorized access, disruption, disclosure, use, modification or destruction. It is the security provided in terms of three elements called confidentiality, availability and
Cyber Bullying is defined by the National Crime Prevention Council as - "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person" (National Crime Prevention Council).
Cyber security consists of technologies, processes and measures that are designed to protect systems, networks and data from cyber crimes.
Cyber stalking and bullying is traumatizing especially for children because it is because of such incidents that make a child withdraw from social gatherings and becomes scared of the outside world. In some extreme instances, cyber stalking has been known to result to death. This is because though it starts with the real world and develops into the internet it also penetrates into the physical world where the perpetrators result to physical
According to the Bureau of Justice Statistics, the three general types of cybercrime are “Cyber-attacks are crimes in which the computer system is the target. Cyber-attacks consist of computer viruses (including worms and Trojan horses), denial of service attacks, and electronic vandalism or sabotage. Cyber theft comprises crimes in which a computer is used to steal money or other things of value. Cyber theft includes embezzlement, fraud, theft of intellectual property, and theft of personal or financial data. Other computer
Hacking is a practice of art and the feature of systems. It is the practice of changing a computer hardware or software to archive a goal outside of the hacker’s original purpose, mostly common among teenagers and young adults. This is also known as Cyber hacking, which is using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data etc. Cyber Hacking costs many organizations millions of dollars every year.
Computer hacking: Is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers. Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills. The majority of hackers are technology buffs. They are self-motivated and learning about computers is their true passion. ("What Is Computer Hacking?" WiseGEEK. N.p., n.d. Web. 27 July 2013).
When talking about cybercrime, we need to understand why it has become a big issue and how it affects all of us and our daily lives. In today’s society, a considerable amount of our daily activities are done over the internet including some on public sites such as social media and others behind password protected portals such as our online bank accounts. We communicate, shop, socialize, and control or manage most of our devices over the internet. With all this information available via the internet it becomes a treasure chest for cyber criminals filled with valuable information that can be stolen. Cybercrime is a
Michael Mullen says “the single biggest existential threat that 's out there, I think, is cyber” (“Daily Quotes” n.pag.). This quote supports how cyber-crime can be very dangerous and should be looked at closer by individuals in our society. As the world’s computer technologies advance criminals find ways to make theft, fraud, and harassment easier and harder to resolve. Crimes committed through a computer are referred to as cyber-crimes and there are six common computer crimes to look out for, which is fraud, computer trespassing, hardware hijacking, spam, information warfare, and the most common bullying, stalking, and harassment.
Identity theft is a major crime that is aided heavily using computers. Identity theft is when a hacker taps into government files or corporate files. These files are all on record for tax and credit purposes. The files on the government databases have everything about you. They have your name, social security number, address, and even the names of your kids. If you made a payment to the IRS with a check or a credit card, hackers can see this too. (Johnson, J) With all this information they can make fake drivers licenses, social security cards, and even vote for you. With all of this knowledge an ok hacker can steal your identity and put you deep into debt without you knowing. They can even go as far as to print up a birth certificate for themselves. The most peculiar incident of identity theft is when a man wanted to be a woman. He stole her name and identity and made it his own. He even went so far he had the operations
The first one is method for utilizing a PC to connect another PC. Case Dos assaults, hacking, infection work assault
Cyber security is the sum of technical, regulatory and administrative tools that are used to prevent the use of unauthorized and misappropriation. Also, recover the information and communication systems with their contained information in order to ensure the availability and the work continuity in information systems. Besides that, cyber security enhance the protection, confidentiality and privacy of personal data and to take all necessary measures to detect, mitigate, and recover.
Cyber Security also called computer security and IT security, is the assurance of data from theft or any harm to the gadget, the product and information stored on hardware. It incorporates controlling physical access to the equipment and additionally ensuring against code or data injection or via network access.
There are many types of computer crimes and the most famous one is hacking. Hacking is the ability of gaining unauthorized access to systems or resources. Hacking is now commonly defined as someone breaking into a computer system. Trojan Horses is a program designed to breach the security of a computer system. An example of this is someone writing a seemingly harmless program, while the program really contains harmful code and data. There have even been programs that were “Trojan Horses”. These programs were supposed to search and find viruses, but the program turned out to be viruses itself.
Americans are becoming heavily dependent on modern day technology, which produce more vulnerability to cyber-attacks such as security breaches. Cyber security, also known as information technology security, is information security as applied to computers and computer networks. It is designed to protect networks, programs, computers and data from attacks. These attacks can lead to damages or unauthorized access to data. Computer security also includes protection from unplanned events and natural disasters. Cyber security main function is to guard computers, networks, programs and data from unintended or unauthorized access, change or destruction.
Cyber crimes refer to crimes committed against computers, computer networks of the information stored in computers (Bronk, 2008). In the past, the main problem that law enforcement officers have faced with regard to cyber crimes has had to do with the jurisdiction. With the prominence of the internet as a means communication and computers are a means of accessing information, cyber crimes have become prevalent. However, given the realisation that cyber crimes can be committed by any one, at anytime and anywhere in the world, issues of jurisdictions have been the major problem facing the criminal justices. Besides, the justice system has been confronted with traditional crimes that are carried out through the cyber systems. Today, crimes such as stalking are mostly carried out through cyber systems such as the internet. Given the complex nature of cyber crimes, most justice departments have realized that the best way t o handle cyber crimes through the use of non-tradition justice strategies.