Cyber Crime Research Paper - Southeastern Louisiana University

advertisement
Cyber Crimes: An Overview
Phyllis Babin, Christy Bourgeois, Kristin Dupuy, and Rebecca Templet
Department of Education
Southeastern Louisiana University,
Hammond, LA 70402
ABSTRACT
Cyber crime is a serious threat that continues to plague the Internet. It is defined
as any criminal act involving a computer or network. Every year billions of dollars are
lost due to cyber crimes, and it is one of the fastest growing areas of crime. This is due in
part to the speed, convenience, and anonymity technology provides in order to commit
such a wide variety of criminal activities. Although there are many types of cyber
crimes, the top five crimes include malware, identity theft, cyberstalking, child
pornography, and spam. This paper will provide a concise explanation of cyber crimes.
It will focus on the five most common cyber crimes and address various methods to
protect against such crimes. The paper concludes with a discussion about ????? (maybe advances in cyber crimes)????.

Keywords: cyber crime, malware, identity theft, cyber stalking, spam,
online predators, firewall
WHAT IS CYBER CRIME
As Internet usage continues to increase, crimes using the Internet become more
prevalent. Cyber crime is any criminal act that involves a computer and/or network.
Cyber crime can occur in several different forms, and the top five computer crimes
include: malware, identity theft, cyberstalking, child pornography, and spam (7). The
average cost of cyber crimes to organizations is almost $12 million in a ten-month period,
which is a 78 percent increase from four years ago (3). United States incurs the highest
average cost of cyber crimes compared to United Kingdom, Germany, Australia, Japan,
and France. Although cyber crimes are serious and often cause substantial monetary
damage, many victims, including most victimized businesses, do not report offenses to
law enforcement (8).
MALWARE
IDENTITY THEFT & FRAUD
Identity theft occurs when someone steals a victim’s personal information and
uses it without his/her permission to commit fraud or other crimes. Identity theft includes
tax-related identity theft, child identity theft, and medical identity theft. The Federal
Trade Commission estimates that nine million Americans are victims of identity theft
every year (10). The most common type of identity theft is credit-card fraud rather than
full-blown identity theft. Credit-card fraud occurs when a thief uses someone else’s card
to make purchases. More serious cases of identity theft include using other’s personal
information (social security number) to open accounts and/or take out loans which can
wreak havoc on personal finances, credit history, and can take time, money, and patience
to resolve (2). According to a national survey of prosecutors, credit card fraud and
identity theft are the most frequently prosecuted cyber crimes (8).
There are many things that one can do in order to protect themselves against
identity theft and/or fraud. Guarding your information online is especially important to
prevent theft or fraud. One way that criminals try to obtain personal information is
through a technique known as phishing. Phishing is a trick in which spam or pop-ups
mimic legitimate banks or businesses to obtain personal information, which can be used
to fraudulently access your accounts (10). Another key to protection is regularly
monitoring bank statements, credit card statements, and credit reports. There are also
many businesses and/or firms that provide identity theft protection at a cost (i.e.,
LifeLock and TrustedID). Federal law limits your liability in the event of theft or fraud
but depends on how quickly you report the loss or theft (2).
CYBER STALKING
SPAM
Spam is any unsolicited email in which the sender is attempting to gain an
advantage and which the recipient neither asked for nor wanted. The Controlling the
Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 was the
first-ever federal protection against unwanted commercial emails (6). Most opponents of
the CAN-SPAM Act argue that it imposes on freedom of speech; regardless, most
jurisdictions have some form of legislation against spam emailing. Like identity theft and
fraud, there are programs available to protect against spam. MailWasher, Spam Sleuth,
and Spam Subtract Pro are some of the most reputable programs, but there are many
other spam-fighting software programs available. Most Internet service providers (ISP)
offer built-in spam filters without any additional cost. Therefore, spam can be stopped
before it ever reaches your inbox.
ONLINE PREDATORS/CHILD PORNOGRAPHY
FIREWALL
CONCLUSION
REFERENCES
Download