Members:
Topic:
Logical Mind Map of 'www':
Logical Mind Map of 'brain':
Essay:
Perhaps, both similarity and the difference tells us
the different purpose of the two man sitting on their desktop. The first one is
probably to portray a cybercrime that has been happening around. Hence, a guy
is in a stereotyped thief clothes on the desktop as majority of a cyber-criminal
will not be wearing a thief clothes while they are on a desktop. On the other
hand, the second picture shows us that the guy is in his home based office or
rather modern office that allows their employees to have a comfortable
environment while they are working.
Fang Xi - 110037134
Kim Dae Heon - 110028496
Low Sook Sin - 110040989
Oko-Oboh Owen Bright - 110040601
Samir MK Alborno - 109071125
Topic:
www = brain
Logical Mind Map of 'www':
Essay:
Title - Cybercrime
First Crime is each act is illegal, the sense that each
activity is contrary to the customary laws recognized status and applicable
across different countries of the world. This activity if used the media and scientific-technical,
computer crime has become a verb.
Electronic crimes “are all wrongful conduct or Immoral
or Unauthorized. Regard to Automatic Processing of the data and
transfer "the fact that the technical means are either used in the
commission of the act or the environment and the medium in which the offense
occurs or the objective or goal to commit a criminal act. This means that the mediator be a technical machine as a
computer, which is always a way to do criminal-mail without neglecting some other
technical devices as the third generation of mobile phones, especially with the
widespread use of the Internet has turned the world into a small village as a
means of global communication relies on computer programs Modern in various
data and data informatics minute set.
E-crime can be described as any act aimed at eliminating the
use of modern technology through electronic media, and with the invasion of the
Internet the world has become more difficult to control and detection of these
crimes because they are cross-border no religion or homeland them, and are
super fast without supervision or control and without censorship any of the
state led to commit all forms of criminal activity generally accepted online
even murder as evidenced by the return to our author of cyber-crime, as robbery
to computer programs for the purpose of theft of data base information data
even secret ones and used in espionage, or those relating to piracy and robbery
on the money along with the emergence of what has been termed terrorism-mail
and threatening the national security of States, as well as the crimes morals
and compromising morality through electronic pornography embodied sexual
pornographic websites, in particular those aimed for children, estimated at
more than 1,000 sites offering sexual material especially pornography to
children below the age of puberty where the use of child prostitution and
women, whether or eye palace photographed by directly or simulated digital
representation of the image by using the means of persuasion and intimidation
and temptation as a warning or threat.
The types
of perpetrators of computer crimes:
1. Either be professional
criminals
2. Must either be an amateur, and
they are called geniuses young informatics.
The
driving reasons to commit computer crimes
1. Passion for gathering
information and learning.
2. Love adventure and excitement.
3. Personal motives: they often
commit crimes as a result of the programmed computer power and his sense of
self, and his ability to break into the system, rushes under the influence of a
strong desire for self-realization.
4. Financial gain.
5. I have a curiosity of many.
6. Digital Guide difficulty
discovery
There
are many practical and procedural problems and difficulties that appear when
you commit a cybercrime, and these problems:
1. The difficulty of proving the
crime
2. The difficulty of identifying
the official criminally responsible for the criminal act.
3. Difficulty inflict punishment
offender resident abroad.
4. Conflict of criminal laws in
place.
5. The difficulty of reaching the
culprit
6. Shortcomings in the existing
criminal statutes.
The
most important pictures in the electronic criminal assault following crimes:
1. Fraud crimes online
2. Political crimes by spying on
countries through the Internet, and try to penetrate military systems.
3. Destruction and tampering with
computer systems crimes, and so by accessing the network and the destruction of
computer programs, or publishing subversive sites and viruses.
4. Theft of intellectual property
rights crimes by copying the original software and marketing or use without
prior permission, putting the manufacturers of these programs for many of the
financial losses.
5. Crimes related to reproduction
of the recorded information over the Internet illegally, or imitated.
6. Steal information that it look
like just moral Information.
7. Insults and defamation crimes
online
8. Molesters life of individuals.
9. Method of virus transmission,
which is the preferred method pirates have in particular, some viruses may be
best known in this way, including: virus (Trojan), and virus (love) (18), and
virus (the trap), and virus (Scam), and other viruses.
10. The method of theft slides:
one of the most heavily traded among thieves, Internet roads.
Random
Words Association
The
Problem:
How to prevent cybercrime?
The
Random Word:
E-Crime
The
Objects Related:
Money, Personal Information, Privacy, Kidnap, Scam,
Password, Jail, Law, Free Wi-Fi, Public Computer, Antivirus, Police Report, Self
Awareness
The
Associations:
1. Money
-
Criminals often steal money from users’ bank account through internet.
2. Personal Information
-
Online frauds happen when thefts get other users’ data to counterfeit their
identity.
3. Privacy
-
Cybercrime irrupt users’ privacy.
4. Kidnap
-
Cybercrime might leads to a more critical crime like kidnapping and raping.
5. Hack
-
Hacking is a breakthrough into computers program and computer networks, which
is a common types of cybercrime.
6. Password
-
Criminals could simply break through a short and simple password and access to
users’ account information.
7. Jail
-
One will be imprisoned for cybercrime.
8. Laws
-
Laws are rules made by government to forbid certain actions and are enforced by
the courts.
9. Free Wi-Fi
-
Personal information like contact numbers, photos, data, and etc. may leak when
users use public hotspot.
10. Public Computer
-
Public accesses of internet in libraries, internet cafes, airports, and etc.
are an extremely security risk.
11. Antivirus
-
A malware, spyware and firewall software helps to prevent potential cyber-attacks.
12. Police Report
-
Victim must report to local police if he suspects a crime or a scam.
13. Self-Awareness
-
A conscious of knowing one’s own act, attitude, and character.
The
Solutions:
1. Money
-
Enforce encryption of one’s financial data, or an organization’s business data
with professional security.
2. Personal Information
-
Do not reveal information on unofficial website that may harm one’s personal
safety such as full name, location, and etc.
3. Privacy
-
Use a high privacy control setting. Control the content one shares on social
website like do not tell the others our contact numbers and the place we live.
4. Kidnap
-
Gives proper advice to youngster of how to protect themselves while using
internet.
5. Hack
- Avoid checking
internet content from unknown sources such as advertisement, mail, and etc.
6. Password
-
Usage of a stronger password that is harder to guess. One also should change
passwords regularly to keep his accounts secure.
7. Jail
- Strict punishment
for cybercrime.
8. Laws
-
Government enforces law strictly to control the crimes.
9. Free Wi-Fi
-Be
aware of what you do while using public Wi-Fi. Do not login account to
important website like e-banking website while using free internet hotspot.
10. Public Computer
-
Secure one’s information by not accessing to website that you have to submit
your name, address, phone number, and financial information. Never store the
data in public computer.
11. Antivirus
-
Purchase reliable malware software and activate firewall to block any spyware
attacks.
12. Police Report
-
Report to the police when one become the victim of cybercrime.
13. Self-Awareness
-
Building one’s self-awareness is a long term practice to reduce the risk of
becoming a victim of crime.
Juxtaposition
00:18 |
Category: |
0
comments





Comments (0)