Cyber Crime Investigation
The increasing frequency of crimes with the use of technology is alarming from the perspective of their prevention. Hence, it implies the intervention of specialists and their understanding of the situation. According to the research, most incidents are connected to fraud and computer misuse in various forms (Caneppele & Aebi, 2019). For the purposes of this presentation, two resources were thoroughly analyzed. The first article’s credibility was verified by the use of governmental data, and the second publication was an evidence-based study reflecting trends.
The first cyber crime is identity theft, and it implies receiving personal information for its consequent unlawful use. With the help of these data, individuals can commit fraud (Norwich University Online, 2020). The process of obtaining the details is simple: a recipient opens an email from a seemingly reliable source and provides his password or social security number (Norwich University Online, 2020). As a result, the so-called phishing messages explaining the need to follow the instructions allow criminals use others’ accounts for their benefit.
The second type of cyber crimes is software piracy, and it is an unauthorized use of computer programs. More specifically, it includes their reproduction and distribution for onward selling (Norwich University Online, 2020). This fraud is another cyber-enabled event, which means that it is committed with the help of the Internet while remaining the same as an offline offense in the essence (Caneppele & Aebi, 2019). It implies violations of licensing agreements limiting the specified number of users and illegally copying the materials.
The third cyber crime, which is more common than other offenses, is hacking. It means stealing personal information without the knowledge of victims for private purposes (Norwich University Online, 2020). This event falls under the category of cyber-dependent crimes or, in other words, is possible only in an online environment (Caneppele & Aebi, 2019). It is performed by finding weaknesses in systems and obtaining data (Norwich University Online, 2020). Therefore, its significance is conditional upon the threat to both individuals and organizations.
The fourth type of cyber crime is malware, and it is also known as malicious software. This offense refers to the actions of individuals intended to interfere with computers’ functioning and is frequently complemented by software piracy or hacking (Norwich University Online, 2020). It is one of the most popular illegal acts rapidly growing in volumes. This crime is performed through sending hybrid programs, which contain viruses, worms, and trojans (Norwich University Online, 2020). Thus, it should be approached with caution and timely detected for prevention.
Caneppele, S., & Aebi, M. F. (2019). Crime drop or police recording flop? On the relationship between the decrease of offline crime and the increase of online and hybrid crimes. Policing: A Journal of Policy and Practice, 13(1), 66-79. Web.
Norwich University Online. (2020). 5 types of cyber crime: How cybersecurity professionals prevent attacks. Web.