• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society.

Extracts from this document...


Tariq Ameer #116 ITGS 11-H Sept. 15, 2011 Write a 2-page essay about what is biggest technology related threat to the society. High-tech crime (computer crime) is the use of technology to commit a crime. It is the biggest tech related threat to the society. According to the 2011 Norton Cybercrime Report, in 2010 more than 430 million adults were victimized at a cost of US$388-billion in direct and indirect losses from computer crime world wide. The direct financial losses from cybercrime stood at US$114 billion, while US$274 billion was the value of time that victims spent in solving the crimes [1]. High-tech crimes include identity theft, cyber-stalking, hacking confidential systems, pyramid schemes, planting harmful viruses, and many others. ...read more.


Medical Identity theft is using a person?s name or insurance information to get medical services/goods or just to make false claims. Child identity theft on the other hand is using a child?s Security Number for personal gains. Identity cloning on the other hand is to assume the identity of another person for daily life. Cyber-bullying is the use of modern technology (mostly the internet) to harm people on purpose. New bullying statistics revealed that around half of teens with Internet access have been the victims of cyber bullying [2]. Cyber-bullying can lead to depression and even suicide. Unlike physical bullying, cyber-bullies can remain anonymous and the bullying can continue all day every day. Many think cyber-bullying only happens to children, but it also happens to adults, which is known as cyber-stalking. ...read more.


Others hack bank security systems to illegally obtain money (also known as defrauding). Other reasons for hacking are creating public attention for oneself, illegal subscription, and altering or obtaining classified information. And even though security systems are being improved, so is hacking. Other major high tech-crimes include drug trafficking, cyber terrorism, and cyber warfare. Drug dealers are taking advantage of the Internet and other technologies to sell illegal drugs. And the lack of face-to-face communication causes an increase of Internet drug trade. Cyber terrorism is the act of terrorism through the use of cyberspace. Cyber warfare, which is considered one of the most controversial and threatening high-tech crimes, is the act of sabotage and espionage through politically motivated hacking. These examples and many more are the reason why high-tech crime is the biggest threat to society when it comes to technology. Sources: 1. 1. http://business.financialpost.com/2011/09/07/cyber-crime-cost-canadians-5-5-billion-in-2010-study-finds/ 1. 2. http://www.bullyingstatistics.org/content/cyber-bullying-statistics.html 2. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Marked by a teacher

    Examine the key features around the growth, development and policing of cyber crime in ...

    4 star(s)

    It will look very genuine to service users and often many of them fall into the trap. E-Mail bomb is another type of attack that can be made, hundreds of emails are sent to a service in order to shut it down.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    sending important data in which hackers will not get through to the data at all. This would mean more capital being spent on security but Teign and Tow would have to think long term if they are to remain a successful company.

  1. Crime and crime prevention

    has been set up in your name without your knowledge financial institutions that you do not normally deal with contact you to chase an outstanding debt. Statistic show that the latest estimate is that identity fraud costs the UK economy �1.7 billion in 2006.

  2. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, ...

    the 'Prestel System' operated by BT, which provided subscribers with both email facilities and access to number of database service." (D.Rowland & E. Macdonald, 2005) so even they did not mean to do that but they tricked BT operates and as a result they were caught and a prosecution was bought under Forgery and Counterfeiting Act 1981.

  1. The Sullivan's matrix report

    These cultures are mostly found as combinations in organisations. Organisations have different information assets and their staff members have different information needs. Therefore, in order to use these information assets appropriately you need a customised culture which is aligned to the information needs of the organisation.

  2. Local area networks (LANs).

    F is used for fiber optic cable and it's effective range is 2000 meters. LAN TOPOLOGY After all the hardware is selected the topology must be designed. There are three basic architectures a network can be configured in. The first is the star, where all computers are connected in a point-to-point manner to a central computer or hub.

  1. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    External attacks to the network have to be dealt with in a very different way to internal attacks as nothing can actively be done until an attack is launched against a network. This means that detection and protection needs to start at the front door of the network (firewall)

  2. Computer Networks.

    The 10baseT requires the telephone bell-connector-type connection. Network cards A network interface card (or just network card) is a piece of hardware needed inside a PC in order to use it as a terminal for a network. It is a small circuit board that slots into one of the main connectors on the motherboard.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work