Types Of Computer Criminal Behaviors And Topologies

Computer Behaviours and Topologies

Computer Behaviours and Topologies

Different Types of Computer Behaviors and Topologies

Discuss the Different types of computer behaviours and topologies, Comparison of the similarities between different types of computer criminal behaviour and topologies and Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies?

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

According to Gostev (2012), the development of digital technologies represents an opportunity for any business to provide new tools for communication. The online activities become central to the way people live. However, this internet represents opportunities to cyber criminals. Computer crime is an act that is performed by the computer user, sometimes referred to as hacker that browses the company’s private information illegally (Greenbaum, 2015).  Additionally, computer crime includes the crimes that are to be conducted using internet such as hate crimes, online fraud, thefts of bank account details; these are considered to be computer or cyber crimes when these illegal activities are to be dedicated through the use of computer (Walker-Osborn & McLeod, 2015).

According to Prasanthi (2015), at a basic level, the types of computer behaviour are divided into the following categories, but there is no such universally accepted typology of the Internet crimes.

Online Assault: It involves the violence that is raised through internet such as the threats that results in emotional response on the victim. The online assaults are of different types such as cyber bullying, online sexual exploitation of children etc. Cyber bullying occurs when the minors use the internet devices to tease as well as harass other minors (Henson, Reyns & Fisher, 2011). The online sexual exploitation occurs when a child by using internet; establish some online relationships with other children. Social networking sites are the place for the offender to make such type of crime (Patel, 2012).

Online Fraud: It uses the online sites in an effort to profit financially. Such types of online fraud are sale fraud, inheritance scams as well as phishing etc. In sale fraud, the selling of products on the online sites is misrepresented by the seller of the products (Walker-Osborne & Price, 2011). Therefore, after the payment of the products, they never delivered those products to the buyer (Keen, 2011). Such that in inheritance scams, a criminal contacted the victim and told that they win some lottery online of a large amount (Al-Agaga, 2012). Then the victim is being instructed to pay an amount to initiate the process to deliver the money. In phishing, the criminal poses as lawful business includes credit card Company, online retailer to convince the victim to give the information related to password; bank details (Sood & Enbody, 2011). Sometimes, it also involves spoofed emails to do the fraud. Such schemes are used to take the personal information of the victim to profit financially by withdrawing funds from the account of that victim (Holt, 2014).

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Comparison of Similarities Between Different Types of Computer Criminal Behavior and Topologies

Cyber extortion: It occurs when a website as well as computer system is endangered with repeated denial of service by the malicious hackers. These hackers claim for money in return of promise to stop the attacks and promise to offer protection (Barn, 2012)

Online theft: It is mainly used to steal the information as well as money from the owner. This type of crime often involves the misuse of the victim’s personal information for the purpose of committing theft (Vijaya Geeta, 2011). It consists of online piracy to share intellectual property by using the Internet; the problem of piracy is being compounded by peer-to-peer contribution of files throughout which the resources can be distributed illegally (Edwards, 2014).

Online Intrusion: It involves the use of internet to infect the space of other individual, computer systems (Takieddine & Sun, 2015). It is the act that an individual attempt to surpass a computer system’s safety measures is referred to as hacking. Viruses are designed to spread throughout the whole computer to reduce the efficiency of the system (Raiu, 2012).

The similarities between different types of computer criminal behaviour and topologies are that all the computer crime is being unauthorized access to computer systems or any networks (Caldwell, 2013). Most of the crime includes the stealing of information stored in the computer hard disks or detachable storage media. Normally, this kind of theft is done by getting hold of access of the login id as well as password of the victim (Cornford, 2011). This is one of the reported cases of cyber crime in all over the world.  The crime is done against any organization, individuals, individual property (Nuredini, 2014). The offenders focus on the financial gain such as the use of phishing emails to gain access to details of the bank account. At the time of investigating the threat, the law enforcement is challenged while tracing the actions to the source (Barmaki, 2012). In some instances, technological devices are served as repositories for evidence of the cybercrime. All these cyber crimes would be harmful for the organization in the area of financial property as well as transfer of data within the organizations (Bednar, Katos & Hennell, 2014).

Mostly, computer crimes focus on the financial gain but in case of child exploitation, the motive is not always profit. The motive may include intellectual curiosity or challenge, revenge, gaining some respect in online communities etc. The difference between a cyber attacks to commit crime as well as commit terror is found in the intension of the attacker (Mitchell & Chen, 2014). Online frauds as well as online theft are different from each other. Fraud is a lie, if someone allows believing something that is not true and the victim are being fraud. Theft is losing of money from computer crime.

Comparison of Differences Between Different Types of Computer Criminal Behavior and Topologies

Financial frauds as well as identify theft are conducted by the hackers to evolve into serious threats to the financial services industry and any organization (Vadza, 2011). According to computer crime and security survey, these two are the world’s most cyber crime threat. Most of the organizations are benefited from understanding the different computer criminal behaviour and topologies (Farrington & Ttofi, 2014). From there understanding, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that there is no chance of suffering any data loss in case of hacking (Hörnle, 2012). The company should avoid sending the credit card number to any site that is not safe. The organization must use the latest as well as updated antivirus to prevent their computer’s data against the virus attacks; and use a security programme to give control over cookies (Patel, 2012). An organization should ensure a security awareness that prevent the attack and make the attackers think twice before committing any cyber crime (Hua & Haughton, 2012).

Psychological screening is an extreme step that should be done before the hiring of employees in an organization (Sahu, Maheshwari & Sahu, 2015). Most of the organizations are benefited by the further research in psychological profiling of the hackers (Kumar & Mittal, 2012). Therefore, modelling behaviour can be assisted and it is predictive in nature; providing a criminal justice system as well as information technology industry to prevent the unauthorized use of data (Payne & Hollin, 2014).  Although, various qualitative data exist to build the profile of the individuals that may fit the psychological model of the cyber crime (McIntyre, 2014).

Conclusion

The advancement of technology such as Internet provides both the individuals as well as organizations with a mean to commit crimes; therefore millions of people are affected by online crime every day. The computer crime is becoming one of the most threatening crimes for both law enforcement as well as the public. These crimes are hate crimes, internet fraud, thefts of credit card account, and telemarketing fraud, these are measured to be computer or cyber crimes when the illegal actions are to be committed throughout using of both computer and internet. Online assault is the crime that involves the crime of harassment, threats of violence etc. Online fraud or theft is the use of dishonesty as well as violate of confidence online to profit financially. Online intrusion involves using of Internet to damage other individual’s computer programs. Therefore, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that the individual may not suffer from any data loss in case of hacking.

Analysis of Benefits for Organizations in Understanding Computer Criminal Behaviors and Topologies

Reference List

Al-Agaga, A. (2012). FACTORS THAT INFLUENCE E-LOYALTY OF INTERNET BANKING USERS. Ijecs, 3(2), 297-304. doi:10.7903/ijecs.1097

Barmaki, R. (2012). Book Review: Computer Crime, Investigation, and the Law. Criminal Justice Review, 37(1), 132-133. doi:10.1177/0734016811405286

Barn, D. (2012). Insuring cyber-assets. Computer Fraud & Security, 2012(9), 5-8. doi:10.1016/s1361-3723(12)70090-8

Bednar, P., Katos, V., & Hennell, C. (2014). On the complexity of collaborative cyber crime investigations. DEESLR, 6(0). doi:10.14296/deeslr.v6i0.1894

Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud & Security, 2013(7), 5-10. doi:10.1016/s1361-3723(13)70062-9

Cornford, A. (2011). Criminalising Anti-Social Behaviour. Criminal Law, Philosophy, 6(1), 1-19. doi:10.1007/s11572-011-9134-9

Edwards, C. (2014). Ending identity theft and cyber crime. Biometric Technology Today, 2014(2), 9-11. doi:10.1016/s0969-4765(14)70033-5

Farrington, D., & Ttofi, M. (2014). Criminal careers in self-reports compared with official records. Criminal Behaviour And Mental Health, 24(4), 225-228. doi:10.1002/cbm.1932

Gostev, A. (2012). Cyber-threat evolution: the year ahead. Computer Fraud & Security, 2012(3), 9-12. doi:10.1016/s1361-3723(12)70052-0

Greenbaum, D. (2015). Cyber crime 2.0. Science, 348(6231), 193-193. doi:10.1126/science.aaa7298

Henson, B., Reyns, B., & Fisher, B. (2011). Crime and Criminal Behavior. Retrieved 12 July 2015, from

Holt, T. (2014). Cyber war will not take place, by Thomas Rid. Global Crime, 15(1-2), 206-208. doi:10.1080/17440572.2014.884235

Hörnle, T. (2012). Criminalizing Behaviour to Protect Human Dignity. Criminal Law, Philosophy, 6(3), 307-325. doi:10.1007/s11572-012-9177-6

Hua, G., & Haughton, D. (2012). A network analysis of an online expertise sharing community. Soc. Netw. Anal. Min., 2(4), 291-303. doi:10.1007/s13278-012-0047-y

Keen, A. (2011). Tracking online fraud across the globe. New Scientist, 211(2831), 62. doi:10.1016/s0262-4079(11)62358-0

Kumar, P., & Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal Of Technoethics, 3(1), 43-52. doi:10.4018/jte.2012010104

McIntyre, L. (2014). Cyber-Takings: The War on Crime Moves into the Cloud. Pittsburgh Journal Of Technology Law And Policy, 14(2). doi:10.5195/tlp.2014.148

Mitchell, R., & Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. CSUR, 46(4), 1-29. doi:10.1145/2542049

Nuredini, A. (2014). CHALLENGES IN COMBATING THE CYBER CRIME. Mediterranean Journal Of Social Sciences. doi:10.5901/mjss.2014.v5n19p592

Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), 28-30. doi:10.15373/22778160/january2014/11

Payne, K., & Hollin, C. (2014). Alexithymia, Asperger’s syndrome and criminal behaviour: a review. Journal Of Criminal Psychology, 4(2), 155-162. doi:10.1108/jcp-11-2013-0030

Prasanthi, M. (2015). Cyber Crime: Prevention & Detection. International Journal Of Advanced Research In Computer And Communication Engineering, 45-48. doi:10.17148/ijarcce.2015.4311

Raiu, C. (2012). Cyber-threat evolution: the past year. Computer Fraud & Security, 2012(3), 5-8. doi:10.1016/s1361-3723(12)70051-9

Sahu, B., Maheshwari, D., & Sahu, N. (2015). Simulation Model for Cyber Crime Reduction. International Journal Of Computer Applications, 115(21), 20-22. doi:10.5120/20275-2693

Sood, A., & Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud & Security, 2011(7), 11-16. doi:10.1016/s1361-3723(11)70073-2

Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research And Applications. doi:10.1016/j.elerap.2015.06.001

Vadza, K. (2011). Cyber Crime & its Categories. IJAR, 3(5), 130-133. doi:10.15373/2249555x/may2013/39

Vijaya Geeta, D. (2011). Online identity theft – an Indian perspective. Journal Of Financial Crime, 18(3), 235-246. doi:10.1108/13590791111147451

Walker-Osborn, C., & McLeod, B. (2015). Getting Tough on Cyber Crime. ITNOW, 57(2), 32-33. doi:10.1093/itnow/bwv042

Walker-Osborne, C., & Price, J. (2011). The War on Cyber Crime. ITNOW, 53(6), 30-31. doi:10.1093/itnow/bwr061