.

Sunday, March 31, 2019

Computer Crimes And Hacking

estimator Crimes And HackingAs the Internet growth, it creates convenience for human and benefit for the market. However, at that place atomic number 18 many hidden negative effects behind, the electronic computer crime. The following put back showing numbers of computer crimes in Hong Kong.The computer crimes are in a increasing shape. In this study, we pass on look into antithetical kinds of computer crimes. And provide some prevention for different crimes.DescriptionE-auction role playerThe E-auction fraud is a kind of crime that happened in E-auction. There are different kinds of E-auction fraud. The most common type is stealth fake products.There is discussion slightly the e-auction fraud in Hong Kong in January, 2010. A 19-year-old young was arrested in suspected of e-auction fraud of HK$100,000, and it involved to a greater extent than 20 cases of e-auction fraud. In the case, the younker post some information of foreign fashion clothing and accessories on the e -auction site, and asked the buyer to deposit the money to the designated bank reputation prototypic, and claimed that the goods leave alone be sent after payment. that the delivery didnt happen, and the buyer had lost his money. (Sing Tao Ltd., 2010)2.1.1 saloon and dissolverCheck the e-auction websites ab reveal the protection policies.Learn the sell story of the seller before placing a bid. If cant find whateverthing out about the seller, than avoid doing business with them.Never ever give out the in the flesh(predicate) information to another(prenominal)s, like the reference book card number, or bank account information until concord thoroughly checked out the seller and the escrow service. invariably save the history of the transaction information.2.1.2 Legal and good contentsAs for the e-auction fraud, on that point is not a specific law for every kinds of e-auction fraud. But selling fake products, cheating money and stealing buyer ainised for malefactor i ntent, then it will be against the laws in Hong Kong. In the case sample, the adolescent opposes the morality. He tried to make money in an illegal way. Its disgraceful, because the youth is too greedy. He tried to earn fast money without nonrecreational effort on it. And he lost integrity to the one who reliance him and buy his products.2.2 Spamming correspond to the Yip, Tse Tang (2010), spamming is the act of delighting unsolicited electronic messages in bulk, whether for commercial or non-commercial purpose. Sending unsolicited messages does not take a hop to emails. It happens with postal cast out mails and cast away fax. Spam by emails is the most practically seen form of spamming on the Internet. Emails are delivered with contents or messages for commercial advertising. Because of the belittled cost on sending email emails in massive scale, Non-commercial junk emails are also found.There is news about spamming, this time not on E-mail its on the cell phone. IT compa nies has set up websites and send SMS to the cell phone exploiters. Its selling point is free enrollment, but there is a hidden charge for each SMS. When the drug users register the account, it means the familiarity can send the SMS to the registered users and receive charges. And the comp some(prenominal) sends 80 messages to a user within 1 hour each message cost HK$5, the user being charged much than ten thousand dollars a month. (--, 2010)2.2.1 barroom and SolutionThe following solution and prevention are based on the E-mail spammingCheck the privacy policy of websites or companies before providing any individualized information when filling in some web registration forms, online surveys, etc.Check the terms and conditions of the email service more carefully, particularly their privacy policy when subscribing to free email account work, when filling in the account profile.Open different email accounts for different purposes, like Gmail for give instruction work, Hotma il for office work, etc.Simply delete emails from unknown vectors because reply or click on the link in the email means the sender is confirming that the email address is a valid one.Ask the ISPs for any anti-spam solution or install email filters to make a dismal list for reducing the amount of spam emails.2.2.2 Legal and Ethical issueIn Hong Kong, there doesnt does have any specific anti-spam legislation. But there are detailed guidelines on spam prevention found in a Code of Practice issued by the Hong Kong ISP Association (HKISPA) in 2000.The HKISPA asks its ISP members, to take on terms in their Internet access agreement that require the subscriber to not engage in sending spam messages. But it isnt a law.For the company, they send out junk mail is because they want to promote their companys products or services. Bu they dont understand that this will cause problem to the one who received the junk mail. For who receive the mails need to waste time on deleting the mails.Digi tal forgeryDigital cutaneous sensess help organizations sustain signer authenticity, accountability, data integrity and non-repudiation of electronic documents and forms.According to Will (2002), Counterfeit website security certificates can be generated and employ make sites appear secure when they are not, says a US computer programmer. The trick could tempt surfers into handing over personal information, such as credit card details.The forgery technique relies on the way Microsofts Internet venturer shell outs the security certificates that verify the identity operator operator of a web site, says Mike Benham. These certificates are used to establish an encrypted connection to a web site so that private information can then be safely turn over over.2.3.1Prevention and SolutionProvide different kinds of security certificates, like the digital signature and digital watermark. Also, all data for issuance encrypted into a metafile.Moreover, prevent submission any personal info rmation on the Internet. And settle not to transfer any unknown certificates and access to any unknown websites.2.3.2 Legal and Ethical issuesCounterfeit a website security certificate is not illegal, but using the fake certificate and try to collect others personal data whitethorn against the laws in Hong Kong. And there is no laws for just counterfeit the website security certificates.Its immoral for collect the personal data from others without their permission. And propose to counterfeit the website security certificates and fill in the original one is also immoral. The malicious intent of doing is not acceptable. identity operator theftThe identity theft usually cause by hackers. The hackers take others personal information, like the credit card numbers, and for criminal uses.Manhattan prosecutors announced that they reveal a large(p) multinational group of credit card and identity theft. The defendants were charged with enterprise corruption, theft, money laundering, fr aud, and other offenses. The crime syndicates used a multinational Internet company to carry out criminal activities from 2001 to 2007. They smuggle credit card numbers and others identity information for selling and earning profit. (-, 2009) The identity theft is usually caused by hacker.2.4.1 Prevention and SolutionFirst of all, handle the account and password carefully. Then encrypt data when transmitting personal information on the Internet. Moreover, dont reply or click any relate embedded in unexpected emails. Last but not least, dont submit personal data on the Internet that may be irrelevant to the purposes of collection, such as credit card number.2.4.2 Legal and Ethical issuesIn Hong Kong, there is Personal Data (Privacy) Ordinance to protect the use of personal information. But posting others basic information on the Internet, like name, age, e-mail address or personal website is not a crime. Only stealing without permission for criminal use is illegal.The one who ste al other personal information and use others information is immoral. They should respect others privacy. But they dont respect it or may be lack of this kind of knowledge. So they may bobble others privacy. They are malicious intent.HactivismHactivism is a conclave that chastens by hackers. And they shared the a la mode(p) hack technologies on the conference.In 2002, there were about 2000 hackers from different countries pull together in New York. They held a big hactivism. At the conference, hackers want to hold information guerilla warfare due to the dissatisfaction of network security for more than 20 countries. And develop out a new package program cock as a declaration of war. Then, the U.S. network security institutions and other large companies worried about the software. Because the new software is likely to become the dent for criminals or even terrorists for stealing trading secrets, and transferring terror information. (-, 2002)2.5.1 Prevention and SolutionThe lar ge companies should be aware of the in style(p) information about the hactivism, because they will announce any latest bug that they find. And the companies should try to keep modify their software to fix the bug of their software. For the normal computer users, they should keep update their software and arranging to protect from being hacked.2.5.2 Legal and Ethical issues memory the conference actually is not illegal. And hacking the software is not illegal too. But publish those hacked software and cause any criminals to other then will be illegal. And hacking to other system is also illegal.The reasons why they hold the conference is due to challenge. They want to compete with other hackers and try to become the first to find out the bugs or problem of the software.Discussion on HackingAccording to George (2008), apple wanted to select a iPhone hacker to the company. The company wants to cleanse the security of the OS system. People may argue that why they hire a hacker to hack their system. But in my view, I cipher hacking is beneficial to the companys products or services. The reason why Im saying this because hacking can follow the companys attention to their released products or services. Hacker will try to find out the bug from the system security and then attack the system. For the Apple case, masses may jail break the iPhone and get the root management of the iPhone. Apple then want to hire the hacker to hack their system for improvement. So when the company found that their systems are being hacked. Then they will cross off that their products are not perfect. So, they will try to keep update the system to avoid being hacked again. The company profit may be touched if their products can be easily hacked due to the comparison of the similar products from other companies. So the companies may keep improving their products and provide the best services to their customers. Thats why Im saying hacking is beneficial.3.1 Action to reduce hacking activitiesThere are some suggestions from the H.K. Government to reduce hacking activities. The suggestions are as followInstall the anti-virus software and personal firewall software on the computer devices.Keep updating the anti-virus software, because the superannuated software can be easily hacked or affected by the new virus.Try not to install any unauthorized software on the computer.Turn off all JavaScript or ActiveX support in the web browser before visiting a un familiar websites. take for the latest security updates and patches to the software.Disconnect from the Internet when not in use. Because attached to the Internet all the time has a high risk of infection, and has a greater probability of being hacked.ConclusionComputer and Internet have brought us convenience to our daily. People should get well use of them. And try to avoid commit any computer crime. The computer users should aware of the latest news of computer crimes and protect their personal information. The Social and Schools should pay more attention on the computer crimes. And promote the proper way to use network resources.

No comments:

Post a Comment