operations |
comment | "parent_author":"",<br>"parent_permlink":"crime",<br>"author":"ashique1319",<br>"permlink":"cyber-crime-do-you-have-any-concern-part-1",<br>"title":"Cyber-crime: Do you have any concern? Part #1",<br>"body":"# **What is Cyber Crime?**\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmTGanVfJDUvqSkkdpyVMyb7oEMdDKyuy8x7LkVgVfwcvN)\n\nGenerally,<br> \u201cCybercrime\u201d means illegal acts,<br> the commission of which involves the use of information and communication technologies\nThe new definition proposed in SA law \u2013 Electronic Communications and Transactions Amendment Bill,<br> 2012 (26 October 2012) states:\n\u201ccyber-crime\u201d means any criminal or other offence that is facilitated by or involves the use of electronic communications or information systems,<br> including any device or the Internet or any one or more of them. \nThe term Cyber-crime,<br> although widely used in the same context over the past two decades,<br> does not have a precise or universal definition. Due to the varying scenarios and environments,<br> it varies between jurisdictions and differs largely based on the perceptions of those involved.\n### Variations of Definitions\n### *Dictionary.com*\nCriminal activity or a crime that involves the Internet,<br> a computer system,<br> or computer technology.\n### *Encyclop\u00e6dia Britannica*\nCybercrime,<br> also called computer crime,<br> the use of a computer as an instrument to further illegal ends...\n### *LawBrain*\nCybercrime encompasses criminal actions that target computer,<br> internet,<br> or network utility,<br> damaging functionality or infiltrating systems and processes.\n### *Oxford Dictionaries*\nCrime conducted via the Internet or some other computer network.\n### *Wikipedia*\nComputer crime,<br> or cybercrime,<br> refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime,<br> or it may be the target.\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmNPDseVFNRpw4AmGPk1bAyNVAWXkP8HZRZotDh6NMH4fa)\n\n## **How does it?**\n1. Cyber Crime\n >Personal purpose.\n >Property and money $$$.\n >Political\n2. Access Point Attacks\n > Unpatched or outdated network software.\n > Obvious,<br> old,<br> or weak passwords.\n > Security that is poorly defined or not well-defined.\n > Having hosts running services that are unnecessary or not secured,<br> such as FTP.\n > Having firewalls with several holes.\n > Having information leaked through finger,<br> telnet,<br> gopher,<br> and other similar services.\n > Software being installed on a network without approval of the Information Systems \n department.\n3. Negligence\n4. Confidential Information\n5. Putting Your Life on the Internet\n6. Child pornography\n7. Viruses,<br> Trojans,<br> and Worms\n## Process\n![image.png (https:\/\/gateway.ipfs.io\/ipfs\/QmRq7nyS87qhjfjRYPikQnhYSzQSMZiu4ip8rU7nJaVvA4)\n## 3. Why it occurs?\nCyber-attacks are hitting the headlines on a daily basis and a lot of effort goes into both preventing them and dealing with the consequences when they have happened. Understanding the motivation behind attacks can help organizations understand more about the risks they face so that they can tackle them.\n***Continued...***\n\n\n",<br>"json_metadata":" \"community\":\"busy\",<br>\"app\":\"busy\/2.4.0\",<br>\"format\":\"markdown\",<br>\"tags\":[\"crime\",<br>\"steem\",<br>\"online\",<br>\"steemit\",<br>\"busy\" " | comment_options | "author":"ashique1319", "permlink":"cyber-crime-do-you-have-any-concern-part-1", "max_accepted_payout":"1000000.000 SBD", "percent_steem_dollars":0, "allow_votes":true, "allow_curation_rewards":true, "extensions":[ |
|