Different Methods of CyberCrime and Their Effects on Modern Society

930 Words2 Pages

Different Methods of Cybercrime and
Their Effects on Modern Society
The world we live in is more technologically advanced than ever before, with newer developments coming every year. Men, women, and children worldwide rely on the Internet for work, school, play, socialization, and any number of other reasons. Yet, despite the great advantages technology gives to us, with our increased reliance and connectivity comes an increased risk of crime, namely cybercrime (Department of Homeland Security, 2013). Cybercrime encompasses illegal activities conducted through a computer and the internet by a hacker (Webopedia, 2013). A hacker is not an average criminal in the sense that he or she will break into your house and steal your brand new HD TV. A hacker breaks into your electronic devices and steals something even more valuable; your credit card info, or even your identity, right from the safety of their own home.
Cybercrime comes in many forms. The most common are personal or group crimes such as “hate crimes, telemarketing and internet frauds, identity theft, and credit card thefts” (Webopedia, 2013). Even more dangerous cybercrimes include “cyber-based terrorism and espionage”, which present national safety threats (Federal Bureau of Investigation, 2013). Cybercrime used to be a difficult act to commit, as hacking programs needed to be built from the base up, which required extensive knowledge in programming. However, cybercrime is easier to commit now than it was all those years ago, with the necessary tools being available to “anyone armed with a computer and a few dollars” (Ellyat, 2013). Troels Oerting, head of the European Cybercrime Centre, had this to say;
Now everybody can be a hacker. You don't need to be tech-savvy or ...

... middle of paper ...

...quote. December 2, 2013, Retrieved from: http://www.cnbc.com/id/100959481 Quinstreet Inc. (2013). Cyber crime. Retrieved December 2, 2013, from: http://www.webopedia.com/TERM/C/cyber_crime.html Samani, Raj (2013, Aug 13). Direct quote. Retrieved December 2, 2013, from: http://www.cnbc.com/id/100959481
TrendLabs. (2012). [Graphic illustration of cyber threats]. Threats and Technology: How Attacks
Adapt. Retrieved December 2, 2013, from: http://about-threats.trendmicro.com/us/infographics/infograph/how-attacks-adapt U.S. Department of Homeland Security. (2013). Combat cyber crime. Retrieved December 2,
2013, from: http://www.dhs.gov/combat-cyber-crime
U.S. Department of Homeland Security. (2013). Cybersecurity overview. Retrieved December 2,
2013, from: http://www.dhs.gov/cybersecurity-overview

More about Different Methods of CyberCrime and Their Effects on Modern Society

Open Document