Cyber Paper

Submitted by: Submitted by

Views: 194

Words: 601

Pages: 3

Category: Business and Industry

Date Submitted: 05/26/2013 01:04 PM

Report This Essay

Cyber Crimes

The next part of our legal process and training deck involves Cyber crimes. This is serious threat and as technology grows so does the crimes related to the internet. There are many types of cyber crimes. I will list a few of the most common ones below and a brief definition to get you familiarized and to be aware and how to apply to day to day job functions:

Spam

The most common type of cyber crime is spam. laws towards spam are new when related to emails, but older laws did exist regarding unsolicited electronic communications for many years. Spam is pretty much receiving emails that you did not want nor is work related, these should be reported immediately.

Fraud

Credit Fraud is another common form of cyber crime. Certain computer viruses can log keystrokes on your keyboard and send them to hackers, who can then take your social security number, credit card number and home address. This information will and can be used by the hacker for his own means or sold.

Piracy

Downloading music, movies and entertainment online from peer to peer websites is illegal and a form of a cyber crime, must make sure employees are not doing this at the work place.

Cybercrimes are serious and committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threaten to undermine the growth of the younger generation.

Lets look at cyber crimes more related in the work place. Cyber Crimes in the office may include scenarios where employees use their authorization to get some business data and change it or sell it in order to make money themselves. such illegal activities may cause...