Cyber crimes are on the increase bringing untold distress. It is a growing threat to society caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and Internet and other networks. It thus presents major challenges to the ethical use of information technologies.
It has become one of the major security issues for the law enforcement community, industry, e-business judiciary and the academia.
Attacks on online banking customers and business by cyber criminals have brought about new security concerns and subsequent legislation to protect both business and the private individuals.
The most distinct nature of cyber crime from traditional one is borderless and anonymous. By the help of pervasive network technology cyber crime is ramping over areas, regions and countries.
Cyber crime is becoming one of the Net’s growth businesses. Today criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorisms.
Personal information and account details have been stolen over the internet. Illegal transactions have siphoned money from personal and business accounts to foreign third party accounts.
The most popular form of fraud, and one that is difficult for auction website operators to controls, is called shilling. This is the process of bidding up the price of an auction item by people who have no intention of buying it.
Cyber crime poses serious threats to the integrity, safety, and survival of most E-business systems, and thus makes the development of effective security methods a top priority.
In the past, business created private networks, which were secure LAN systems that were closed to outside access. Only computers that were actually connected to the private networked by wires could access the information.
The only real concern was that someone with access to the system, such as employee, might violate the system’s security, copy information and remove it from the business’s premises without authorization.
Typically, e-business security has focused on protection from cyber crime via a broad range of security means, namely the implementation of firewall, authentication, encryption, antivirus software, intrusion detection and penetration testing.
Cyber crime in E-Business
A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.
The Most Popular Posts
-
Accuracy of a computer is consistently high and the degree of accuracy of a particular computer depends on the instructions and the type of ...
-
Much of the world runs on computers and computers profoundly changed human life mostly for better. What is the characteristics for computer:...
-
The utility programs is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing computer...
-
When all the circuitry for a digital computer is contained on one integrated circuit, the unit is called a microcomputer. Even though ther...
-
Computer is versatile in nature. Multi-processing features of computer makes it quiet versatile in nature. It can control a variety of job...