Search icone
Search and publish your papers

Adjusting to Terrorism

Or download with : a doc exchange

About the author

area coordinator
Level
General public
Study
administrat...
School/University
university...

About the document

Published date
Language
documents in English
Format
Word
Type
case study
Pages
2 pages
Level
General public
Accessed
0 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Internet crimes
  3. Administrative response
  4. Conclusion

An Internet crime is criminal activity that takes place on the World Wide Web. There are numerous crimes that fall under the category of computer crime. Cyber terrorist crimes can be aimed at a person, a business, or a nation.

Spam is the most common of all internet crimes. Spam is the sending unwanted electronic messages to multiple recipients. Spam is virtual junk mail. Pyramid schemes, fraudulent pleas to help ill stricken youngsters come in the form of spam messages. Some spam asks the recipients to donate money to a cause; the cause or organization requesting the donation does not exist.
Malware and Spyware

Hackers will send a user a program that is disguised as a downloadable file. Some webpages mask malware that upon entering the site the user's computer will be at risk. Malicious spyware can infect a computer and actually be aimed at stealing an individual's identity. The hacker's virus can even log the keys that the computer's user types. Social Security numbers, credit card numbers, birthdays, and other personal information that if obtained can be used in an attempt to pose as someone else. ?According to a Symantec report at the end of 2006, Beijing is now home to the world's largest collection of malware-infected computers, nearly 5 percent of the world's total? (Greenberg, 2007, pg. 1, para. II).

[...] There happens to be a new breed of terrorism. Rather than gun, ammo, and suicide bombers these terrorists are using computer, modems, WiFi, and software. Internet Crimes An Internet crime is criminal activity that takes place on the World Wide Web. There are numerous crimes that fall under the category of computer crime. Cyber terrorist crimes can be aimed at a person, a business, or a nation. Spam Spam is the most common of all internet crimes. Spam is the sending unwanted electronic messages to multiple recipients. [...]


[...] Greenberg, Andy. (2007). The top countries for cybercrime. Retrieved on March from http://www.msnbc.msn.com/id/19789995/ns/technology_and_science- security/t/top-countries-cybercrime/#.T3pCfNVElg0. Guynn, Jessica. (2010). Chinese hackers pose a growing threat to U.S. firms. Retrieved on March from http://articles.latimes.com/2010/jan/15/business/la-fi-google-china15- 2010jan15. Lazarus, David. (2009). Using hacking skills to protect companies. Retrieved on March from http://articles.latimes.com/2009/aug/22/local/me-lazarus22. Leonard, Jack and Monte Morin. (2002). Stalking the Web Predator. Retrieved on March from http://articles.latimes.com/2002/jan/17/news/mn-23213. [...]

Similar documents you may be interested in reading.

The uncertainties in the fight against terrorism and the United Nations (UN)

 Politics & international   |  International affairs   |  Thesis   |  01/27/2011   |   .doc   |   26 pages

Adjusting to Terrorism: Internet crime, response

 Politics & international   |  Social sciences   |  Case study   |  11/11/2013   |   .doc   |   1 page

Recent documents in administrative law category

Conflict management styles paper

 Law & contracts   |  Administrative   |  Case study   |  09/13/2013   |   .doc   |   2 pages

Malfunction junction case study

 Law & contracts   |  Administrative   |  Case study   |  09/13/2013   |   .doc   |   3 pages