Tuesday, September 10, 2019

Cyber Crimes Coursework Example | Topics and Well Written Essays - 500 words

Cyber Crimes - Coursework Example Computer programs that breach the target system facilitate it. Examples of hacker’s objectives include illegal funds transfer and retrieval of information such as in cases of deformation need to undermine competition. Another type of cyber crime is â€Å"cyber stalking,† defined as continuous harassment initiatives or actions, over the internet that induces considerable threats to a victim (Gupta, 2006, p. 7). Examples of cyber stalking include online sending of intimidating messages or calls (Gupta, 2006). Another type of cyber crime that has developed with the increased level of dependence on electronic system is â€Å"software piracy† (Gupta, 2006, p. 9). Pirating software means stealing software or illegally obtaining and distributing its counterfeit copies. Business organizations’ reliance on software for data recording, storage, and analysis identifies the enterprises as prime victims of software piracy. The piracy has a number of disadvantages to the victim businesses, buyers of counterfeit software, who cannot obtains rights of usage and warranties on the products besides risking hardware because the pirated products are hardly tested for approval (Gupta, 2006). Infecting other parties’ system through spreading viruses is another type of ‘cyber-classified’ crime. This involves dissemination of a harmful program to other parties’ systems and may aim at paralyzing a business’ network to interfere with its operations. Other cyber cri mes include jamming of networks and committing frauds over the internet (Siegel, 2008). One of the effective measures to warding cyber crimes is legal deterrence, initiative that can be achieved by reporting, to law enforcement authorities, cases of cyber crimes or behaviors suspected to possibly lead to cyber crimes. This, together with provision of evidence, facilitates successful prosecution of offenders and discourages others from engaging in cyber crimes. Reporting

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.