Transaction: e5111ac0c215928ddfe5fd2e70c47466d0853c77

Included in block 22,457,194 at 2018/05/15 17:04:21 (UTC).

Transaction overview

Loading...
Transaction info
transaction_id e5111ac0c215928ddfe5fd2e70c47466d0853c77
ref_block_num 43,862
block_num22,457,194
ref_block_prefix 2,303,751,589
expiration2018/05/15T17:14:18
transaction_num 65
extensions[]
signatures 1f2665c3043469e6970dd3d43aa6bfbbc53ef52337835406d9ab4c4f8bd26e22fc0808b7e84d914bf864bfcd03585130ebaabdad592f8c4ad0b80306eda5b26749
operations
comment
"parent_author":"",<br>"parent_permlink":"crime",<br>"author":"ashique1319",<br>"permlink":"cyber-crime-do-you-have-any-concern-part-1",<br>"title":"Cyber-crime: Do you have any concern? Part #1",<br>"body":"# **What is Cyber Crime?**\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmTGanVfJDUvqSkkdpyVMyb7oEMdDKyuy8x7LkVgVfwcvN)\n\nGenerally,<br> \u201cCybercrime\u201d means illegal acts,<br> the commission of which involves the use of information and communication technologies\nThe new definition proposed in SA law \u2013 Electronic Communications and Transactions Amendment Bill,<br> 2012 (26 October 2012) states:\n\u201ccyber-crime\u201d means any criminal or other offence that is facilitated by or involves the use of electronic communications or information systems,<br> including any device or the Internet or any one or more of them. \nThe term Cyber-crime,<br> although widely used in the same context over the past two decades,<br> does not have a precise or universal definition. Due to the varying scenarios and environments,<br> it varies between jurisdictions and differs largely based on the perceptions of those involved.\n### Variations of Definitions\n### *Dictionary.com*\nCriminal activity or a crime that involves the Internet,<br> a computer system,<br> or computer technology.\n### *Encyclop\u00e6dia Britannica*\nCybercrime,<br> also called computer crime,<br> the use of a computer as an instrument to further illegal ends...\n### *LawBrain*\nCybercrime encompasses criminal actions that target computer,<br> internet,<br> or network utility,<br> damaging functionality or infiltrating systems and processes.\n### *Oxford Dictionaries*\nCrime conducted via the Internet or some other computer network.\n### *Wikipedia*\nComputer crime,<br> or cybercrime,<br> refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime,<br> or it may be the target.\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmNPDseVFNRpw4AmGPk1bAyNVAWXkP8HZRZotDh6NMH4fa)\n\n## **How does it?**\n1. Cyber Crime\n >Personal purpose.\n >Property and money $$$.\n >Political\n2. Access Point Attacks\n > Unpatched or outdated network software.\n > Obvious,<br> old,<br> or weak passwords.\n > Security that is poorly defined or not well-defined.\n > Having hosts running services that are unnecessary or not secured,<br> such as FTP.\n > Having firewalls with several holes.\n > Having information leaked through finger,<br> telnet,<br> gopher,<br> and other similar services.\n > Software being installed on a network without approval of the Information Systems \n department.\n3. Negligence\n4. Confidential Information\n5. Putting Your Life on the Internet\n6. Child pornography\n7. Viruses,<br> Trojans,<br> and Worms\n## Process\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmRq7nyS87qhjfjRYPikQnhYSzQSMZiu4ip8rU7nJaVvA4)\n## 3. Why it occurs?\nCyber-attacks are hitting the headlines on a daily basis and a lot of effort goes into both preventing them and dealing with the consequences when they have happened. Understanding the motivation behind attacks can help organizations understand more about the risks they face so that they can tackle them.\n***Continued...***\n\n\n",<br>"json_metadata":" \"community\":\"busy\",<br>\"app\":\"busy\/2.4.0\",<br>\"format\":\"markdown\",<br>\"tags\":[\"crime\",<br>\"steem\",<br>\"online\",<br>\"steemit\",<br>\"busy\" "
comment_options
"author":"ashique1319",
"permlink":"cyber-crime-do-you-have-any-concern-part-1",
"max_accepted_payout":"1000000.000 SBD",
"percent_steem_dollars":0,
"allow_votes":true,
"allow_curation_rewards":true,
"extensions":[
* The API used to generate this page is provided by @steemchiller.