Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Computer Behaviours And Topologies

tag 16 Downloads8 Pages 1,951 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss the Different types of computer behaviours and topologies, Comparison of the similarities between different types of computer criminal behaviour and topologies and Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies?

 

Answer:

Introduction

According to Gostev (2012), the development of digital technologies represents an opportunity for any business to provide new tools for communication. The online activities become central to the way people live. However, this internet represents opportunities to cyber criminals. Computer crime is an act that is performed by the computer user, sometimes referred to as hacker that browses the company’s private information illegally (Greenbaum, 2015).  Additionally, computer crime includes the crimes that are to be conducted using internet such as hate crimes, online fraud, thefts of bank account details; these are considered to be computer or cyber crimes when these illegal activities are to be dedicated through the use of computer (Walker-Osborn & McLeod, 2015).

Different types of computer behaviours and topologies

According to Prasanthi (2015), at a basic level, the types of computer behaviour are divided into the following categories, but there is no such universally accepted typology of the Internet crimes.

Online Assault: It involves the violence that is raised through internet such as the threats that results in emotional response on the victim. The online assaults are of different types such as cyber bullying, online sexual exploitation of children etc. Cyber bullying occurs when the minors use the internet devices to tease as well as harass other minors (Henson, Reyns & Fisher, 2011). The online sexual exploitation occurs when a child by using internet; establish some online relationships with other children. Social networking sites are the place for the offender to make such type of crime (Patel, 2012).

Online Fraud: It uses the online sites in an effort to profit financially. Such types of online fraud are sale fraud, inheritance scams as well as phishing etc. In sale fraud, the selling of products on the online sites is misrepresented by the seller of the products (Walker-Osborne & Price, 2011). Therefore, after the payment of the products, they never delivered those products to the buyer (Keen, 2011). Such that in inheritance scams, a criminal contacted the victim and told that they win some lottery online of a large amount (Al-Agaga, 2012). Then the victim is being instructed to pay an amount to initiate the process to deliver the money. In phishing, the criminal poses as lawful business includes credit card Company, online retailer to convince the victim to give the information related to password; bank details (Sood & Enbody, 2011). Sometimes, it also involves spoofed emails to do the fraud. Such schemes are used to take the personal information of the victim to profit financially by withdrawing funds from the account of that victim (Holt, 2014).

Cyber extortion: It occurs when a website as well as computer system is endangered with repeated denial of service by the malicious hackers. These hackers claim for money in return of promise to stop the attacks and promise to offer protection (Barn, 2012)

Online theft: It is mainly used to steal the information as well as money from the owner. This type of crime often involves the misuse of the victim’s personal information for the purpose of committing theft (Vijaya Geeta, 2011). It consists of online piracy to share intellectual property by using the Internet; the problem of piracy is being compounded by peer-to-peer contribution of files throughout which the resources can be distributed illegally (Edwards, 2014).

Online Intrusion: It involves the use of internet to infect the space of other individual, computer systems (Takieddine & Sun, 2015). It is the act that an individual attempt to surpass a computer system’s safety measures is referred to as hacking. Viruses are designed to spread throughout the whole computer to reduce the efficiency of the system (Raiu, 2012).

Comparison of the similarities between different types of computer criminal behaviour and topologies

The similarities between different types of computer criminal behaviour and topologies are that all the computer crime is being unauthorized access to computer systems or any networks (Caldwell, 2013). Most of the crime includes the stealing of information stored in the computer hard disks or detachable storage media. Normally, this kind of theft is done by getting hold of access of the login id as well as password of the victim (Cornford, 2011). This is one of the reported cases of cyber crime in all over the world.  The crime is done against any organization, individuals, individual property (Nuredini, 2014). The offenders focus on the financial gain such as the use of phishing emails to gain access to details of the bank account. At the time of investigating the threat, the law enforcement is challenged while tracing the actions to the source (Barmaki, 2012). In some instances, technological devices are served as repositories for evidence of the cybercrime. All these cyber crimes would be harmful for the organization in the area of financial property as well as transfer of data within the organizations (Bednar, Katos & Hennell, 2014).

 

Comparison of the difference between different types of computer criminal behaviour and topologies

Mostly, computer crimes focus on the financial gain but in case of child exploitation, the motive is not always profit. The motive may include intellectual curiosity or challenge, revenge, gaining some respect in online communities etc. The difference between a cyber attacks to commit crime as well as commit terror is found in the intension of the attacker (Mitchell & Chen, 2014). Online frauds as well as online theft are different from each other. Fraud is a lie, if someone allows believing something that is not true and the victim are being fraud. Theft is losing of money from computer crime.

Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies

Financial frauds as well as identify theft are conducted by the hackers to evolve into serious threats to the financial services industry and any organization (Vadza, 2011). According to computer crime and security survey, these two are the world’s most cyber crime threat. Most of the organizations are benefited from understanding the different computer criminal behaviour and topologies (Farrington & Ttofi, 2014). From there understanding, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that there is no chance of suffering any data loss in case of hacking (Hörnle, 2012). The company should avoid sending the credit card number to any site that is not safe. The organization must use the latest as well as updated antivirus to prevent their computer’s data against the virus attacks; and use a security programme to give control over cookies (Patel, 2012). An organization should ensure a security awareness that prevent the attack and make the attackers think twice before committing any cyber crime (Hua & Haughton, 2012).

Psychological screening is an extreme step that should be done before the hiring of employees in an organization (Sahu, Maheshwari & Sahu, 2015). Most of the organizations are benefited by the further research in psychological profiling of the hackers (Kumar & Mittal, 2012). Therefore, modelling behaviour can be assisted and it is predictive in nature; providing a criminal justice system as well as information technology industry to prevent the unauthorized use of data (Payne & Hollin, 2014).  Although, various qualitative data exist to build the profile of the individuals that may fit the psychological model of the cyber crime (McIntyre, 2014).

Conclusion

The advancement of technology such as Internet provides both the individuals as well as organizations with a mean to commit crimes; therefore millions of people are affected by online crime every day. The computer crime is becoming one of the most threatening crimes for both law enforcement as well as the public. These crimes are hate crimes, internet fraud, thefts of credit card account, and telemarketing fraud, these are measured to be computer or cyber crimes when the illegal actions are to be committed throughout using of both computer and internet. Online assault is the crime that involves the crime of harassment, threats of violence etc. Online fraud or theft is the use of dishonesty as well as violate of confidence online to profit financially. Online intrusion involves using of Internet to damage other individual’s computer programs. Therefore, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that the individual may not suffer from any data loss in case of hacking.

 

Reference List

Al-Agaga, A. (2012). FACTORS THAT INFLUENCE E-LOYALTY OF INTERNET BANKING USERS. Ijecs, 3(2), 297-304. doi:10.7903/ijecs.1097

Barmaki, R. (2012). Book Review: Computer Crime, Investigation, and the Law. Criminal Justice Review, 37(1), 132-133. doi:10.1177/0734016811405286

Barn, D. (2012). Insuring cyber-assets. Computer Fraud & Security, 2012(9), 5-8. doi:10.1016/s1361-3723(12)70090-8

Bednar, P., Katos, V., & Hennell, C. (2014). On the complexity of collaborative cyber crime investigations. DEESLR, 6(0). doi:10.14296/deeslr.v6i0.1894

Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5-10. doi:10.1016/s1361-3723(13)70062-9

Cornford, A. (2011). Criminalising Anti-Social Behaviour. Criminal Law, Philosophy, 6(1), 1-19. doi:10.1007/s11572-011-9134-9

Edwards, C. (2014). Ending identity theft and cyber crime. Biometric Technology Today, 2014(2), 9-11. doi:10.1016/s0969-4765(14)70033-5

Farrington, D., & Ttofi, M. (2014). Criminal careers in self-reports compared with official records. Criminal Behaviour And Mental Health, 24(4), 225-228. doi:10.1002/cbm.1932

Gostev, A. (2012). Cyber-threat evolution: the year ahead. Computer Fraud & Security, 2012(3), 9-12. doi:10.1016/s1361-3723(12)70052-0

Greenbaum, D. (2015). Cyber crime 2.0. Science, 348(6231), 193-193. doi:10.1126/science.aaa7298

Henson, B., Reyns, B., & Fisher, B. (2011). Crime and Criminal Behavior. Retrieved 12 July 2015, from

Holt, T. (2014). Cyber war will not take place, by Thomas Rid. Global Crime, 15(1-2), 206-208. doi:10.1080/17440572.2014.884235

Hörnle, T. (2012). Criminalizing Behaviour to Protect Human Dignity. Criminal Law, Philosophy, 6(3), 307-325. doi:10.1007/s11572-012-9177-6

Hua, G., & Haughton, D. (2012). A network analysis of an online expertise sharing community. Soc. Netw. Anal. Min., 2(4), 291-303. doi:10.1007/s13278-012-0047-y

Keen, A. (2011). Tracking online fraud across the globe. New Scientist, 211(2831), 62. doi:10.1016/s0262-4079(11)62358-0

Kumar, P., & Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal Of Technoethics, 3(1), 43-52. doi:10.4018/jte.2012010104

McIntyre, L. (2014). Cyber-Takings: The War on Crime Moves into the Cloud. Pittsburgh Journal Of Technology Law And Policy, 14(2). doi:10.5195/tlp.2014.148

Mitchell, R., & Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. CSUR, 46(4), 1-29. doi:10.1145/2542049

Nuredini, A. (2014). CHALLENGES IN COMBATING THE CYBER CRIME. Mediterranean Journal Of Social Sciences. doi:10.5901/mjss.2014.v5n19p592

Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), 28-30. doi:10.15373/22778160/january2014/11

Payne, K., & Hollin, C. (2014). Alexithymia, Asperger's syndrome and criminal behaviour: a review. Journal Of Criminal Psychology, 4(2), 155-162. doi:10.1108/jcp-11-2013-0030

Prasanthi, M. (2015). Cyber Crime: Prevention & Detection. International Journal Of Advanced Research In Computer And Communication Engineering, 45-48. doi:10.17148/ijarcce.2015.4311

Raiu, C. (2012). Cyber-threat evolution: the past year. Computer Fraud & Security, 2012(3), 5-8. doi:10.1016/s1361-3723(12)70051-9

Sahu, B., Maheshwari, D., & Sahu, N. (2015). Simulation Model for Cyber Crime Reduction. International Journal Of Computer Applications, 115(21), 20-22. doi:10.5120/20275-2693

Sood, A., & Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud & Security, 2011(7), 11-16. doi:10.1016/s1361-3723(11)70073-2

Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research And Applications. doi:10.1016/j.elerap.2015.06.001

Vadza, K. (2011). Cyber Crime & its Categories. IJAR, 3(5), 130-133. doi:10.15373/2249555x/may2013/39

Vijaya Geeta, D. (2011). Online identity theft – an Indian perspective. Journal Of Financial Crime, 18(3), 235-246. doi:10.1108/13590791111147451

Walker-Osborn, C., & McLeod, B. (2015). Getting Tough on Cyber Crime. ITNOW, 57(2), 32-33. doi:10.1093/itnow/bwv042

Walker-Osborne, C., & Price, J. (2011). The War on Cyber Crime. ITNOW, 53(6), 30-31. doi:10.1093/itnow/bwr061

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2016). Computer Behaviours And Topologies. Retrieved from https://myassignmenthelp.com/free-samples/computer-behaviours-and-topologies.

"Computer Behaviours And Topologies." My Assignment Help, 2016, https://myassignmenthelp.com/free-samples/computer-behaviours-and-topologies.

My Assignment Help (2016) Computer Behaviours And Topologies [Online]. Available from: https://myassignmenthelp.com/free-samples/computer-behaviours-and-topologies
[Accessed 11 December 2019].

My Assignment Help. 'Computer Behaviours And Topologies' (My Assignment Help, 2016) <https://myassignmenthelp.com/free-samples/computer-behaviours-and-topologies> accessed 11 December 2019.

My Assignment Help. Computer Behaviours And Topologies [Internet]. My Assignment Help. 2016 [cited 11 December 2019]. Available from: https://myassignmenthelp.com/free-samples/computer-behaviours-and-topologies.


At MyAssignmenthelp.com, we are committed to deliver quality assignment assistance in the fastest way possible. To make our service delivery fast, we have hired subject matter experts to work on different subject specific assignments. We have hired experts who owe in-depth knowledge in their respective subjects. As per their expertise, they provide geography assignment help, Physics assignment help, Strategic assignment help, history assignment help, art architecture assignment help and assistance with other subjects as well.

Latest Management Samples

UNCC100: Self And Community: Exploring The Anatomy Of Modern Society 1

Download : 0 | Pages : 4

Answer: Introduction: Many business people around the world may not get it well when the issue of excessive profits is touched, however, as a student studying business in information system and would like to venture as a business person; it is essential to elaborate the issue based on the Catholic Social Teachings. There are two fundamental principles in the Catholic Social Teachings that develop on how human beings should carry out themselve...

Read More arrow

CME101 Residential Construction For Concrete Floors

Download : 0 | Pages : 5

Answer: In situ reinforced concrete would have been preferred for this particular extension because it is normally known to be of high adaptability, resistance to fire, versatility and also resistant to corrosion. This means that it will have nearly negligible maintenance. Concrete floors Advantages Durability Concrete, generally speaking, is a greatly dependable and tough material. While wooden floors or dividers may spoil or break, concr...

Read More arrow

WEL 303A Human Rights And Social Advocacy

Download : 0 | Pages : 8

Answer: The constitutions of the majority of the countries of the world have provisions for various kinds of rights so as to offer the kind of opportunities to the individuals through which they can maximum their potentials (Cole, 2015). Keck and Sikkink (2014) are of the viewpoint that the human rights are the norms or the principles which describe a certain standard of human behavior and are regulated by the legal as well as the governmental...

Read More arrow

MGMT 231 A Report On Selling Philosophy For Restaurant Chain

Download : 0 | Pages : 4

Answer: Introduction This report intends to introduce a product idea for A & W Restaurant chain, as they want to add value to the target market and further enhance the customer base. In order to approach the newer customer base or add more significance to the product a simultaneous service will be launched too. Further, it will explain how this new product and linked service can be positioned in the market. A set of strategies will be con...

Read More arrow

FB659 International Finance For International Expansion

Download : 0 | Pages : 12

Answer: Introduction The purpose of designing this report is to develop theoretical knowledge about different concepts related to international expansion of a business. The organization that is chosen in this report is Wycombe Wanderers. This is a soccer club or football club of UK. This report will help to develop understanding about different methods that can be used by an organization in order to establish itself in the international marke...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,161,673

Orders

4.9/5

Overall Rating

5,051

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1265 Order Completed

97% Response Time

James Cook

Masters in Management

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

440 Order Completed

99% Response Time

Jack Arens

MBA in HRM

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 4/5

248 Order Completed

100% Response Time

Lloyd Bernabe

MSc in Accounting

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

THIS ASSIGNMENT WAS GOOD AND I GOT THE MAKE 66% OUT OF ONE HUNDRED. HOPE NEXT ASSSIGMENT WILL GET MORE

flag

User Id: 195464 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Quality formatting now, and easy to understand the values being added to balance and adjusted ledgers.

flag

User Id: 350523 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Great Job, Great Job, Great Job, No Plagio, Very Professional, I recommended. Great Job, Great Job

flag

User Id: 354366 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating

Hi thank you for helping out with mi assignment the content is good but after but the plagiarism is too high. Then among the internet sources there is ur site appearing.This then defeat s the purpose of using you guys as if the assignment can be tra...

flag

User Id: 257832 - 10 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?