Working with your daily activity with the help of the internet has become an essential part nowadays. However, the network we are using is not always safe from criminals such as crackers (evil hackers). Especially when it comes to sensitive parts which is confidential to us. Network security issues that is caused by the work of another human, not from random errors, is called cybercrime.
People with lacks of networking ethics tends to do bad activity over the net. They start off with small mischievous acts such as falsifying personal information (faking your real name) to real crime which is stealing money from others people’s credit card account. This can be very worrying for honest people trying to do business or work online.
Let us see what are negative acts that categorized as cybercrimes. Cybercrimes in some legit literature is grouped into three categories. The first are those in which computer comprises the ‘object’ of a crime and in which the perpetrator targets the computer itself. For example when you are connected to the net somehow the performance of your computer is lower than usual. It can be caused that someone is stealing your processor time or your computer services by injecting sets of instructions that is built by using low programming language. Thus they can have a taste of your computer performance. Piggyback riding on your internet service network is also on this category. Especially wireless network that aren’t protected by strong enough password can be easily accessed by unauthorized users.
Next category involves those in which computer forms the “subject” of a crime. This is when viruses are attacking your computer. Typical virus which has been attacking our computer is the autorun.inf. The file invokes other virus to execute their instructions and resulted in unwanted condition.
The last category is when the computer serves as the “instruments” for committing traditional crimes. This is when cyber-fraud, online harrassment, and online stealing takes parts. This category has become a very tempting stuff for those crackers out there. It has become daily issues when you receive fraud emails saying you have won some kind of lottery. Many people just want to have easy money.
My personal opinion is that the cyber space is still a study that continue to develop in centuries. That is why the continual of the systems need everyone cooperation to surf safe and done in a desired manners. It is an easy thing to break into someone account, especially social network sites where average people create username and password easy to guess by experts crackers. But it is a hard thing to keep it secure from them. Since in securing need to find all the methods of how to break the system compared to those who just want to break into the system. Which they can just have one or two methods to break in.
Finally it is up to us to decide which sides we are on. Because each individual user is a potentially perpetrator if we don’t have ethics in this field. We can have better society by starting it with ourselves. I hope this little information is useful to you all.
Reference:
bimmerfest.com
http://banking.about.com/od/securityandsafety/Scams_Security_Safety.htm
http://ecommerce.hostip.info/pages/237/Computer-Crime-DEFINITIONS.html
People with lacks of networking ethics tends to do bad activity over the net. They start off with small mischievous acts such as falsifying personal information (faking your real name) to real crime which is stealing money from others people’s credit card account. This can be very worrying for honest people trying to do business or work online.
Let us see what are negative acts that categorized as cybercrimes. Cybercrimes in some legit literature is grouped into three categories. The first are those in which computer comprises the ‘object’ of a crime and in which the perpetrator targets the computer itself. For example when you are connected to the net somehow the performance of your computer is lower than usual. It can be caused that someone is stealing your processor time or your computer services by injecting sets of instructions that is built by using low programming language. Thus they can have a taste of your computer performance. Piggyback riding on your internet service network is also on this category. Especially wireless network that aren’t protected by strong enough password can be easily accessed by unauthorized users.
Next category involves those in which computer forms the “subject” of a crime. This is when viruses are attacking your computer. Typical virus which has been attacking our computer is the autorun.inf. The file invokes other virus to execute their instructions and resulted in unwanted condition.
The last category is when the computer serves as the “instruments” for committing traditional crimes. This is when cyber-fraud, online harrassment, and online stealing takes parts. This category has become a very tempting stuff for those crackers out there. It has become daily issues when you receive fraud emails saying you have won some kind of lottery. Many people just want to have easy money.
My personal opinion is that the cyber space is still a study that continue to develop in centuries. That is why the continual of the systems need everyone cooperation to surf safe and done in a desired manners. It is an easy thing to break into someone account, especially social network sites where average people create username and password easy to guess by experts crackers. But it is a hard thing to keep it secure from them. Since in securing need to find all the methods of how to break the system compared to those who just want to break into the system. Which they can just have one or two methods to break in.
Finally it is up to us to decide which sides we are on. Because each individual user is a potentially perpetrator if we don’t have ethics in this field. We can have better society by starting it with ourselves. I hope this little information is useful to you all.
Reference:
bimmerfest.com
http://banking.about.com/od/securityandsafety/Scams_Security_Safety.htm
http://ecommerce.hostip.info/pages/237/Computer-Crime-DEFINITIONS.html
{ 1 komentar... read them below or add one }
Yes I see
Post a Comment