Discuss About The Identifying Products In Online Cybercrime Marketplaces.
Cyber-crime can be explained as the crimes that are made in the online world or the world of the computers. Since the rise of the technology of the computer systems, the concept of the cybercrimes and the crimes related to the computer systems have also increased. The main motive of these crimes are to extract money from the users of the technology either by the process of the blackmailing to leak some private information or by stealing the data’s form the users or by blocking the access of the user of information and then asking for money in exchange of the information (Leukfeldt and Yar 2016). This paper focuses on the facts briefing about things that are related to the cybercrime. The paper consist of the cyber threats that effects the online world in the regular works. Also these papers helps in the process of thinking that how critical steps can be taken in order to reduce these threats.
As stated earlier in the paper a cyber crime can be explained as a crime that is done using the computer technology for the process of the crime or targeting a computer system for the crime. These crimes not only puts pressure on the financial status of the victim but also in puts mental pressure on the victim. The rate of the cyber crime has increased since the introduction of the ARPANET or the Internet as it is known to the people these days. Since then millions of crimes have been recorded by the cybercrime detecting agencies that is it can be said that almost a new crime is registered every day (Moore 2014). Some of the major cases of the cybercrimes are financial frauds, the cyber terrorism, cyber exorcism or targeting as a computer system for the purpose of staling private information’s. The computer malwares plays some of the most vital role in incrsing or awaking a system for the purpose of the cybercrime.
Cyber Terrorism: The cyber terrorism is one of the most dangerous for of the cybercrime according to many of the researchers and the cybercrime investigating agency. The cyber terrorism can be defined as the form of terrorism done sing the computer sources. Suppose a caller sends a message to an organisation reading that there might be an attack in any place at a fixed interval of time (Hui, Kim and Wang 2017). This is one of the major example of the cybercrime. Other than this the people linked to the terrorism creates some of the major videos targeting the people in order to influence the people in order to get them motivated for doing terrorist acts. The number of these type of the videos have increased and it have done some of the most dangerous effect in the mind of the people.
Types of Cybercrimes
The cyber warfare: The cyber warfare is the cybercrime that is made in such an order that it taken down a specific target infrastructure or industry. One of the most such dangerous crime was documented in the year of 2007 where synchronised attacks from the hackers of the Russia made in Georgia power plant (Waldrop 2016). This is one of the most dangerous form of attacks that cripples down the work of a certain organisation or country.
Cyber bulling or misbehave: This is a new form of the cybercrime that have been made since the rise of the technology like the Facebook and the instagram. It is a common scene where people are found to be seen ding obscene messages to other persons especially the opposite sex (Armin et al. 2017). This is one of the most common form of cybercrime that is made in everyday life. Also the amount of such crimes are increasing with days (Al-garadi, Varathan and Ravana 2016). Publishing of the offensive messages and the content are one of the most common and petty form of cybercrimes that are been done.
Crimes using computer as a tool or making the computers a target is one the most common form of a cybercrime. IN these the computers or any other electronic device is used for the purpose of making the crime. The computer software plays a important role in these type of the attacks (Durrett et al. 2017). Other than this using the technique of the internet call is also one of the other major way in which these type of the attacks are performed. Malwares plays an important role in this kind of the attacks.
A malware can be explained as a computer program that is specifically designed for the purpose of attacking a computer system and do harm in the computer system for the benefit of the attacker. Some of the most common forms that attacks a computer system are the:
- Virus: A virus is a form of the computer program that is designed by a hacker for the purpose of attacking a computer system for the purpose of stealing information from the victim computers (Holt, Brewer and Goldsmith 2018). These are some of the major sources in which a computer system is targeted for the purpose of doing a computer related crime that is a cybercrime.
- Ransomwares attacks: A ransom ware is type of a computer virus is that is designed in such a way that it attacks a computer system and blocks all the access of the user form the system (Kirwan, 2018). The process requires the attacker to use a cryptography technique for the purpose of the encrypting a system and use the technique to block the user form the computer system and in order to give the user the codes for the process of the decryption of the computer the criminal extorts a huge sum of money.
- DDOS – The DDOS or the distributed denial of the service is one of the other major type of a computer crime or cybercrime attack that helps the attacker to increase the amount of the traffic in a certain network for the purpose of doing some crime in the sleeted network.
Owing to these attack many companies are having huge losses in terms of the revenue and others. Due to these attacks these organisation face losses in terms of thee intellectual properly, fame of the organisation and others. These attacks not only harms the organisation in terms of money but also effect the organisations morally (Lagazio, Sherif and Cushman 2014). If any organisation is hit by any cybercrime then common peoples starts losing the trust in the organisation and hence effecting the fame of the organisations. Further due to the losses the organisation starts shorting the employees and hence the common public gets affected by losing jobs. Hence the government and the organisations must take initiatives to reduce such kind of attacks to make the internet safe for the public.
There are many documented cases where the technology is used for the purpose of the doing some of the major and horrific cyber-crimes. One of the most dangerous such crime that have happened in the recent years is the attack of the ransom ware named as the wannacry. This virus almost affected the entire world and the foul players used the technology for the purpose of the extortion of money from the users of the internet (Henson, Reyns and Fisher 2016). The virus locked the system of the organisations and asked for money in the form of the bit coin so that the transactions made are nearly impossible to trace. The main victim of the attack became the people who used the lower versions of the operating systems and the pirated one (Pathak and Nanded 2016). Other than the wannacry attacks other some of the major cybercrimes are the petya attack. The blue whale challenge forced the people to take up challenges that would risk the life of the player, this was one of the other major cybercrime that affected the people of the world and were solved the cyber police.
In order to resolve such type of the cyber problems many of the counties are using the cybercrime police. The work of the cybercrime police is note all the facts that are responsible for the purpose of this type of the crimes and hence reduce such type of the chances of future scopes. Other than taking the help of the police the individuals can do a lot of things in order to reduce this type of crimes. The first thing that is needed to be done is to report to the police about this type of the crimes. The people must always use the advanced technologies for the purpose of the securing there systems. The government of any country must take proper initiatives in order to properly ensure that this type of the crimes are reduced.
Al-garadi, M.A., Varathan, K.D. and Ravana, S.D., 2016. Cybercrime detection in online communications: The experimental case of cyberbullying detection in the Twitter network. Computers in Human Behavior, 63, pp.433-443.
Armin, J., Thompson, B., Ariu, D., Giacinto, G., Roli, F. and Kijewski, P., 2015, August. 2020 cybercrime economic costs: No measure no solution. In availability, reliability and security (arrs), 2015 10th international conference on (pp. 701-710). IEEE
Durrett, G., Kummerfeld, J.K., Berg-Kirkpatrick, T., Portnoff, R.S., Afroz, S., McCoy, D., Levchenko, K. and Paxson, V., 2017. Identifying products in online cybercrime marketplaces: A dataset for fine-grained domain adaptation. arXiv preprint arXiv:1708.09609.
Henson, B., Reyns, B.W. and Fisher, B.S., 2016. Cybercrime victimization. The Wiley Handbook on the Psychology of Violence, pp.553-570.
Holt, T.J., Brewer, R. and Goldsmith, A., 2018. Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime. Deviant Behavior, pp.1-13.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks. Mis Quarterly, 41(2), p.497.
Jhaveri, M.H., Cetin, O., Gañán, C., Moore, T. and Eeten, M.V., 2017. Abuse reporting and the fight against cybercrime. ACM Computing Surveys (CSUR), 49(4), p.68.
Kirwan, G.H., 2018. Dispelling the pseudopsychology of cybercrime.
Lagazio, M., Sherif, N. and Cushman, M., 2014. A multi-level approach to understanding the impact of cyber crime on the financial sector. Computers & Security, 45, pp.58-74.
Leukfeldt, E.R. and Yar, M., 2016. Applying routine activity theory to cybercrime: A theoretical and empirical analysis. Deviant Behavior, 37(3), pp.263-280.
Moore, R., 2014. Cybercrime: Investigating high-technology computer crime. Routledge.
Pathak, P.B. and Nanded, Y.M., 2016. A dangerous trend of cybercrime: ransomware growing challenge. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume, 5.
Waldrop, M.M., 2016. How to hack the hackers: The human side of cybercrime. Nature, 533(7602).
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Identifying Products In Online Cybercrime Marketplaces: An Essay.. Retrieved from https://myassignmenthelp.com/free-samples/ict30005-products-in-online-cybercrime-marketplaces.
"Identifying Products In Online Cybercrime Marketplaces: An Essay.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/ict30005-products-in-online-cybercrime-marketplaces.
My Assignment Help (2019) Identifying Products In Online Cybercrime Marketplaces: An Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/ict30005-products-in-online-cybercrime-marketplaces
[Accessed 09 December 2023].
My Assignment Help. 'Identifying Products In Online Cybercrime Marketplaces: An Essay.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/ict30005-products-in-online-cybercrime-marketplaces> accessed 09 December 2023.
My Assignment Help. Identifying Products In Online Cybercrime Marketplaces: An Essay. [Internet]. My Assignment Help. 2019 [cited 09 December 2023]. Available from: https://myassignmenthelp.com/free-samples/ict30005-products-in-online-cybercrime-marketplaces.