An Internet crime is criminal activity that takes place on the World Wide Web. There are numerous crimes that fall under the category of computer crime. Cyber terrorist crimes can be aimed at a person, a business, or a nation.
Spam is the most common of all internet crimes. Spam is the sending unwanted electronic messages to multiple recipients. Spam is virtual junk mail. Pyramid schemes, fraudulent pleas to help ill stricken youngsters come in the form of spam messages. Some spam asks the recipients to donate money to a cause; the cause or organization requesting the donation does not exist.
Malware and Spyware
Hackers will send a user a program that is disguised as a downloadable file. Some webpages mask malware that upon entering the site the user's computer will be at risk. Malicious spyware can infect a computer and actually be aimed at stealing an individual's identity. The hacker's virus can even log the keys that the computer's user types. Social Security numbers, credit card numbers, birthdays, and other personal information that if obtained can be used in an attempt to pose as someone else. According to a Symantec report at the end of 2006, Beijing is now home to the world's largest collection of malware-infected computers, nearly 5 percent of the world's total (Greenberg, 2007, pg. 1, para. II).
[...] There happens to be a new breed of terrorism. Rather than gun, ammo, and suicide bombers these terrorists are using computer, modems, WiFi, and software. Internet Crimes An Internet crime is criminal activity that takes place on the World Wide Web. There are numerous crimes that fall under the category of computer crime. Cyber terrorist crimes can be aimed at a person, a business, or a nation. Spam Spam is the most common of all internet crimes. Spam is the sending unwanted electronic messages to multiple recipients. [...]
[...] Greenberg, Andy. (2007). The top countries for cybercrime. Retrieved on March from http://www.msnbc.msn.com/id/19789995/ns/technology_and_science- security/t/top-countries-cybercrime/#.T3pCfNVElg0. Guynn, Jessica. (2010). Chinese hackers pose a growing threat to U.S. firms. Retrieved on March from http://articles.latimes.com/2010/jan/15/business/la-fi-google-china15- 2010jan15. Lazarus, David. (2009). Using hacking skills to protect companies. Retrieved on March from http://articles.latimes.com/2009/aug/22/local/me-lazarus22. Leonard, Jack and Monte Morin. (2002). Stalking the Web Predator. Retrieved on March from http://articles.latimes.com/2002/jan/17/news/mn-23213. [...]
[...] More money needs to be spent on developing programs to counteract the electronic terrorist attacks. Electronic terrorism is a great National Security risk; no one should be exempt from company policy that has been put into place to prevent an increased risk. References Associated Press, The. (2001). Law Lets U.S. Prosecute Foreign Hackers. Retrieved on March from http://articles.latimes.com/2001/nov/22/news/mn-7085. Barnes, Julian. (2008). Pentagon computer networks attacked. Retrieved March from http://articles.latimes.com/2008/nov/28/nation/na-cyberattack28. Feldman, Paul. (1988). Computer Crime: Hard to Prove, Prosecute. Retrieved on March from http://articles.latimes.com/1988-11-23/news/mn- 528_1_computer-crime. [...]
[...] Administrative personal must be on their toes when dealing with technical terrorists. More money should be spent on the development of programs that help pinpoint the origin of the terrorists. Development of a program that can detect the use mirrored locations and find the master location would certainly be a proactive technique. Spam, Malware, and Spyware are very common tools of the technical terrorist trade. They are easily disguised as a reasonable downloadable file, anyone can mistakenly hit accept file. [...]
using our reader.