Friday, June 21, 2019

Phishing computer crimes Research Paper Example | Topics and Well Written Essays - 1000 words

Phishing calculator crimes - Research Paper ExampleOn the other hand the biggest pessimistic single-valued function of a computer is for crime purposes. As people make use of the computers they typically think that their activities are confidential and also their personal information are protected. For instance, mesh sites of business nature often gather details from many visitors later on many web sites sell these personal details against the desires of the visitors (Turban, Rainer, & Potter, 2004 OLeary & OLeary, 2007). This is a descriptor of computer crime. There are many other kinds of a computer crime however this paper mainly focuses on phishing. In their book, (Laudon & Laudon 1999, p. 147) define computer crime as the unlawful activities by making use of a computer or against a computer system. The Internets user-friendliness and convenience have fashioned brisk(a) ways for computer crime, well-known forms of which is phishing. Additionally, the computer crimes appear in a wide variety of ways and also cause a number of spartan problems for different people. For instance, nowadays online frauds or frauds utilise the Internet are modern form of the online criminal activities in which an authorized person (normally acknowledged as a hacker) hacks some useful data and information and later on use it to conduct illegal and criminal tasks, such as cash related scandals. In this scenario, the basic intentions of criminals are to earn money, tease other or play games with others. In fact, the Internet is open for everyone which gives the opportunities to criminal people, to steal, new ways to steal them, and new techniques to harm others (Laudon & Laudon, 1999, p. 147). As discussed above, there are many kinds of a computer crime and criminals do it intentionally. For instance, sometimes a dissatisfied employee or terminated thespian can be dangerous to an organization. In this scenario, these people want to damage business with their extensive crimi nal activities (Parker, 2002 OLeary & OLeary, 2007). Therefore, employers should properly scrutinize the background of persons being committed with critical computer related tasks. Some people falsify resume to get jobs. Also, the company should hire trustworthy personnel to minimize crimes related to computers (Parker, 2002 Worthington, 2003, pp. 621-623). In addition, Hacker and Cracker are most widely used terms in computer crimes. In this scenario, Hacker is an external person who can opening through a computer system, typically with no illegal intention. On the other hand, a Cracker is a nasty hacker, who may perhaps turn a stern crisis for the organization (Turban, Rainer, & Potter, 2004). Moreover, Phishing is an emerging problem regarding online data security and information safety. There are a number of cases of identity theft and online frauds using Phishing and other hacking techniques. At the present, Phishing is normally carried out through E-mail or the instant messa ging. In many cases its basic purpose is to direct online traffic to a particular website whose appearance or interface are approximately similar to the actual one. Even though server cannot differentiate between false and master web site so a hacker successfully passes through these security walls. Normally, Phishing techniques are aimed at making fool to the internet users, and making use of the attractive usability of present web expertise. In

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.