2010年11月29日星期一

Group assignment -Q5


NO 5. “Criminals are drawn to the internet because the cloak of cyberspace is virtually impenetrable.” Discuss the statement.

  Internet was an attraction place for criminals to focus their attention because it offered some unique opportunities and features. The behaviors that a perpetrator of violence engages in serve three functional purposes to protect their identity, to ensure the successful completion of the offense, and to facilitate an escape if necessary. Internet offers anonymity to its user; it is attractive to potential perpetrators. Identity on the internet is flexible, and people, if they choose, can achieve total anonymity. The internet transcends spatial boundaries. The internet offers equalization of status (net democracy), where a person is influence is base on his or her skill level. Anyone can access almost any part of the internet. The internet allows appearance. People can mask it; there are some advantages to crime and violence taking place on the internet to the criminal.

  Actually what is criminal of the cyberspace? Criminal of the cyberspace is often the case; there will be an extra hurdle for them to get into others people account. The problem of these criminal gangs that contract to the hackers, and their apparent immunity from the law. Cybercriminal gangs will do whatever they want in the internet. They will hack others people account, passwords and more. The case of the cybercriminal had been increase in a certain time a year and it will cause a lot of bad effect to the society.

  The bad effect of the cybercriminal to the society is they will steal others people profiles, personal detail, password and account from the internet to enter their private area especially of the social networking such as Face book, blog, and messenger. Cybercriminal use others people profiles, personal detail and account to do the bad things such as stolen their money from the bank, get their company information, use others pictures to make the erotic picture and more.

  Some of the way that the cybercriminal to steal others people profiles, passwords and more is sending the virus such as spam, Trojan (panda security, 2010), phishing, spyware, evil twin, portaging and international schemes (gamblingonlinemagazine, 2010). Thus the criminal can makes stealing millions of small amounts quick and easy to get the money from both the gaming sites and the gamblers using them.

  There are many reasons why a person likes to crime on the internet. The reason is the criminal might choose to obscure their identity and become anonymous. Several of these reasons are legal, legitimate and socially approved of there are many criminal like to acts of charity are performed anonymously, for whatever reason, to be acknowledged for their action. There are also many illegal reasons to hide behind the criminal. Criminals typically try to keep themselves anonymous either to conceal the fact that a crime has been committed, or to avoid capture. Anonymity may also be created unintentionally, through the loss of identifying information due to the passage of time or a destructive event.

  Most commentary the criminal on the internet, their names can take on an identity of their own, they are frequently separated from an anonymous from the actual author, and creating more freedom of expression, and less accountability. The internet also did not guaranteed the criminal since IP addresses, in principle, can be tracked, allowing to identify the computer from which a certain post was made, albeit not the actual user.
although there is a lot of the cybercriminal in the cyberspace, there is also having some ways to reduce the cybercriminal in the cyberspace to us and protect ourselves. The way to reduce the cybercriminal is “Green address bar”. This signifies that the site has undergone extensive identity authentication so that you can be confident it is the site it claims to be. The‘s’ in “https://” means the site is encrypted, so the information you enter is secured. “The padlock icon” is to be meaningful this icon must appear in the actual browser interface and not inside the content of the page itself. “Trust marks” is popular trust marks like logos can indicate important things about an online business. And, “Check the web address” is be suspicious of any site with an unknown domain that contains the name of a well-known site in the latter part of the web address. (gamblingonlinemagazine, 2010) There is also have a technology approach may grant a higher degree of security than centralized anonymzing services where a central point exists that could disclose one's identity which call Anonymizing services such as 12P- The Anonymous Network or Tor address the issue of IP tracking to try to protect our information while we are looking through the internet. (Wikipedia, 2010)

  Thus, criminal are drawn to the internet because the cloak of the cyberspace is virtually impenetrable. The criminal can use different IP of the network or use the free Wi-Fi of the coffee shop to crime others people computer. Thus the network company should take some action or created a software that can defend the criminal gangs continue to crime to the society and protect to the safety of the society.

(854 words)

没有评论:

发表评论