Members:
Fang Xi - 110037134
Kim Dae Heon - 110028496
Low Sook Sin - 110040989
Oko-Oboh Owen Bright - 110040601
Samir MK Alborno - 109071125

Topic:
www = brain


Logical Mind Map of 'www':
 


Logical Mind Map of 'brain':

Essay:
Title - Cybercrime

First Crime is each act is illegal, the sense that each activity is contrary to the customary laws recognized status and applicable across different countries of the world. This activity if used the media and scientific-technical, computer crime has become a verb.

Electronic crimes “are all wrongful conduct or Immoral or Unauthorized. Regard to Automatic Processing of the data and transfer "the fact that the technical means are either used in the commission of the act or the environment and the medium in which the offense occurs or the objective or goal to commit a criminal act. This means that the mediator be a technical machine as a computer, which is always a way to do criminal-mail without neglecting some other technical devices as the third generation of mobile phones, especially with the widespread use of the Internet has turned the world into a small village as a means of global communication relies on computer programs Modern in various data and data informatics minute set.

E-crime can be described as any act aimed at eliminating the use of modern technology through electronic media, and with the invasion of the Internet the world has become more difficult to control and detection of these crimes because they are cross-border no religion or homeland them, and are super fast without supervision or control and without censorship any of the state led to commit all forms of criminal activity generally accepted online even murder as evidenced by the return to our author of cyber-crime, as robbery to computer programs for the purpose of theft of data base information data even secret ones and used in espionage, or those relating to piracy and robbery on the money along with the emergence of what has been termed terrorism-mail and threatening the national security of States, as well as the crimes morals and compromising morality through electronic pornography embodied sexual pornographic websites, in particular those aimed for children, estimated at more than 1,000 sites offering sexual material especially pornography to children below the age of puberty where the use of child prostitution and women, whether or eye palace photographed by directly or simulated digital representation of the image by using the means of persuasion and intimidation and temptation as a warning or threat.

The types of perpetrators of computer crimes:
1. Either be professional criminals
2. Must either be an amateur, and they are called geniuses young informatics.

The driving reasons to commit computer crimes
1. Passion for gathering information and learning.
2. Love adventure and excitement.
3. Personal motives: they often commit crimes as a result of the programmed computer power and his sense of self, and his ability to break into the system, rushes under the influence of a strong desire for self-realization.
4. Financial gain.
5. I have a curiosity of many.
6. Digital Guide difficulty discovery

There are many practical and procedural problems and difficulties that appear when you commit a cybercrime, and these problems:
1. The difficulty of proving the crime
2. The difficulty of identifying the official criminally responsible for the criminal act.
3. Difficulty inflict punishment offender resident abroad.
4. Conflict of criminal laws in place.
5. The difficulty of reaching the culprit
6. Shortcomings in the existing criminal statutes.

The most important pictures in the electronic criminal assault following crimes:
1. Fraud crimes online
2. Political crimes by spying on countries through the Internet, and try to penetrate military systems.
3. Destruction and tampering with computer systems crimes, and so by accessing the network and the destruction of computer programs, or publishing subversive sites and viruses.
4. Theft of intellectual property rights crimes by copying the original software and marketing or use without prior permission, putting the manufacturers of these programs for many of the financial losses.
5. Crimes related to reproduction of the recorded information over the Internet illegally, or imitated.
6. Steal information that it look like just moral Information.
7. Insults and defamation crimes online
8. Molesters life of individuals.
9. Method of virus transmission, which is the preferred method pirates have in particular, some viruses may be best known in this way, including: virus (Trojan), and virus (love) (18), and virus (the trap), and virus (Scam), and other viruses.
10. The method of theft slides: one of the most heavily traded among thieves, Internet roads.


Random Words Association
The Problem:
How to prevent cybercrime?

The Random Word:
E-Crime

The Objects Related:
Money, Personal Information, Privacy, Kidnap, Scam, Password, Jail, Law, Free Wi-Fi, Public Computer, Antivirus, Police Report, Self Awareness

The Associations:
1. Money
- Criminals often steal money from users’ bank account through internet.

2. Personal Information
- Online frauds happen when thefts get other users’ data to counterfeit their identity.

3. Privacy
- Cybercrime irrupt users’ privacy.

4. Kidnap
- Cybercrime might leads to a more critical crime like kidnapping and raping.

5. Hack
- Hacking is a breakthrough into computers program and computer networks, which is a common types of cybercrime.

6. Password
- Criminals could simply break through a short and simple password and access to users’ account information.

7. Jail
- One will be imprisoned for cybercrime.

8. Laws
- Laws are rules made by government to forbid certain actions and are enforced by the courts.

9. Free Wi-Fi
- Personal information like contact numbers, photos, data, and etc. may leak when users use public hotspot.
10. Public Computer
- Public accesses of internet in libraries, internet cafes, airports, and etc. are an extremely security risk.

11. Antivirus
- A malware, spyware and firewall software helps to prevent potential cyber-attacks.

12. Police Report
- Victim must report to local police if he suspects a crime or a scam.

13. Self-Awareness
- A conscious of knowing one’s own act, attitude, and character.

The Solutions:
1. Money
- Enforce encryption of one’s financial data, or an organization’s business data with professional security.

2. Personal Information
- Do not reveal information on unofficial website that may harm one’s personal safety such as full name, location, and etc.

3. Privacy
- Use a high privacy control setting. Control the content one shares on social website like do not tell the others our contact numbers and the place we live.

4. Kidnap
- Gives proper advice to youngster of how to protect themselves while using internet.

5. Hack
- Avoid checking internet content from unknown sources such as advertisement, mail, and etc.

6. Password
- Usage of a stronger password that is harder to guess. One also should change passwords regularly to keep his accounts secure.

7. Jail
- Strict punishment for cybercrime.

8. Laws
- Government enforces law strictly to control the crimes. 

9. Free Wi-Fi
-Be aware of what you do while using public Wi-Fi. Do not login account to important website like e-banking website while using free internet hotspot.

10. Public Computer
- Secure one’s information by not accessing to website that you have to submit your name, address, phone number, and financial information. Never store the data in public computer.

11. Antivirus
- Purchase reliable malware software and activate firewall to block any spyware attacks.

12. Police Report
- Report to the police when one become the victim of cybercrime.


13. Self-Awareness
- Building one’s self-awareness is a long term practice to reduce the risk of becoming a victim of crime.

Juxtaposition


Perhaps, both similarity and the difference tells us the different purpose of the two man sitting on their desktop. The first one is probably to portray a cybercrime that has been happening around. Hence, a guy is in a stereotyped thief clothes on the desktop as majority of a cyber-criminal will not be wearing a thief clothes while they are on a desktop. On the other hand, the second picture shows us that the guy is in his home based office or rather modern office that allows their employees to have a comfortable environment while they are working.


Comments (0)