CyberCrime

=__Cybercrime__=

Cybercrime is a term to describe activity in which computers or networks are used a tool, a target, or a place of criminal activity. Examples of cybercrime in which the computer or network is a tool of the criminal activity include spam ming through the network by electronic mail, piracy facilitated by peer- to-peer sftware and criminal copyright crimes.
 * Introduction - What is cybercrime?**

Examples of cybercrime in which the computer or network is a target of criminal activity include unauthorized access (i.e, defeating access controls), malicious code, and denial-of-service attacks.

Examples of cybercrime in which the computer or network is a place of criminal activity include theft of service (in particular, telecom fraud) and certain financial frauds.

A school alerted approximately 80 people that their names and personal information containing social security numbers, dates of births, student grades, home addresses and other vital personal data stored in a prohibited database has been illegally accessed by a computer hacker. The above situation was an example of cyber crime, hacking; it is when people engage in computer cracking in order to gain unauthorized access to an information system. For example, a hacker can access another person’s computer without legitimate permission, and manipulate the data contained within. A hacker can even wipe out or format the computer hard-drive completely. This is a serious ethical issue since it involves invasion of privacy, people’s privilege would be violated. A solution
 * Case Study****- Hacking****:**

This is a serious ethical issue since it involves invasion of privacy, people’s privilege would be violated and that the integrity of the data is also questionable.
 * Ethical and Social Issue:**

Feasible solutions to prevent hackers:
 * 1) A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network, can be used to prohibit unauthorized members, such as hackers from entering a network.
 * 2) Biometrics is also a solution. A school network can implement fingerprint recognition, facial recognition, or voice recognition to authenticate users. Hence, any unauthorized members would be rejected to access [[image:facial_scan_416_dc.gif width="425" height="268" align="right"]]the computer database.[[image:software_firewall_test.gif width="260" height="211" align="left"]]

//**<= Picture of Firewall**//


 * //Picture of facial recognition =>//**

Another prime example of cybercrime is viruses. A virus is a dangerous computer program with the characteristic feature of being able to generate copies of itself, and thereby spreading. It usually brings negative impacts, and is contagious. If a user receives a virus, it can inflict deleterious effects to the computer, such the computer deleting files.
 * Ex****ample- Virus**

Two common reasons for getting a computer virus:
 * 1) Downloading anonymous files or spam (malicious files)
 * 2) Using peer-to-peer software to exchange files between network users.

Feasible solutions of avoiding a computer in getting a virus:
 * 1) Don’t download documents or files from unknown or unreliable sources, if someone you don’t know sends an email attachment with a virus, you won’t get the virus unless you download the file and load it into your computer. Don’t use peer-to-peer software, since everyone in the network are sharing and exchanging files all the time, if a person’s computer in the network contains a virus, the whole chain of computers are in risk of receiving it too. Besides, peer-to-peer software is illegally and should not be encouraged by any means.
 * 2) Even if you get a computer virus, the consequences can be reduced by using anti-virus software. The program detects any malicious documents it consider as a ‘virus’ and eliminates it out of the hard drive, and hence increases security of computer.
 * [[image:image.out.jpg width="258" height="193" align="left"]] //<= Video screen shot of illegal downloading//**

from 2001 - 06 =>//**
 * //Graph of the growing//**
 * //victims of spam in USA

While the development of modern conveniences has brought us many benefits, it also caused several major problems. Storing data collection in a computerized format allows teachers and students to access a particular information easily by the use of IT methods, However, the drawback is that the data is at risk, since cybercrime is so common in this day and age. It is important the people know what they are doing with their computers, they should not be using peer-to-peer software, or downloading illicit material, reason being: a) they might get a virus or become hacked. b) it's unethical!. If people take responsibility and use the computer appropriately, the effects of the problems can be reduced to a minimum.
 * Conclusion**

The scores were assessed from 0 - 5, 1 being poor and 5 being outstanding.
 * Score**- The three graphs below show scores of our presentation that were assessed by 15 H4 students who takes ITGS in IB
 * [[image:111.JPG]]

References**
 * Station X, (2005), Firewall Test Agent, Accessed on September 6, 2007, found on internet: http://www.stationx.net/images/software_firewall_test.gif
 * BBC news, (2007), Biometric Technology, Accessed on September 6, 2007, found on internet: http://news.bbc.co.uk/nol/shared/spl/hi/guides/456900/456993/img/noflash/facial_scan_416_dc.gif
 * The Third Branch, (2007), Cybercrime: New Way to Commit Old Crimes, Accessed on September 6, 2007, found on internet: http://www.uscourts.gov/ttb/sept00ttb/cybercrime.jpg
 * Foto search, (2007), Computer virus, Accessed on September 6, 2007, found on internet: http://www.fotosearch.com/IGS236/is102-013/
 * Veoh, (2007), PSA – Illegal Downloading, Accessed on September 6, 2007 found on internet: http://www.veoh.com/videos/e866606dwJsJ5B
 * RADirect, (2007), White Paper: Is your Email Really Safe?, Accessed on September 6, 2007, found on internet: http://www.rad-direct.com/Product-Support-PineApp-Whitepaper.htm

TEACHER - THIS IS VERY GOOD, THERE ARE A FEW SPELLING ERRORS BUT GENERALLY VERY INFORMATIVE. THE CASE STUDY DOESN'T SHOW MUCH DETAIL. GRADE 7B