Monday, June 3, 2019

Computer Crimes And Hacking

Computer Crimes And HackingAs the Internet growth, it creates convenience for human and improvement for the market. However, at that place are around hidden negative effects behind, the computer abomination. The following table showing numbers of computer crimes in Hong Kong.The computer crimes are in a increasing shape. In this study, we lead look into incompatible kinds of computer crimes. And provide some prevention for different crimes.DescriptionE-auction duperyThe E-auction fraud is a kind of crime that happened in E-auction. in that respect are different kinds of E-auction fraud. The most common type is stealing fake products.There is news most the e-auction fraud in Hong Kong in January, 2010. A 19-year-old youth was arrested in suspected of e-auction fraud of HK$100,000, and it involved more than 20 cases of e-auction fraud. In the case, the youth post some information of foreign fashion clothing and accessories on the e-auction site, and asked the buyer to deposit the money to the designated bank account first, and claimed that the goods will be sent after payment. moreover the delivery didnt happen, and the buyer had lost his money. (Sing Tao Ltd., 2010)2.1.1 Prevention and Solution bind the e-auction sack upsites about the nurseion policies.Learn the interchange history of the seller before placing a bid. If vend find whateverthing out about the seller, than avoid doing business with them.Never ever give out the own(prenominal) information to others, like the credit bait number, or bank account information until have thoroughly checked out the seller and the escrow service.Always save the history of the transaction information.2.1.2 Legal and Ethical issuesAs for the e-auction fraud, there is not a specific law for every kinds of e-auction fraud. only when selling fake products, cheating money and stealing buyer person-to-person for lamentable use, then it will be against the laws in Hong Kong. In the case sample, the teenager opposes the morality. He tried to gain ground money in an illegal way. Its immoral, because the youth is withal greedy. He tried to earn fast money without paying effort on it. And he lost integrity to the one who trust him and buy his products.2.2 Spamming fit to the Yip, Tse Tang (2010), spamming is the act of organiseing unsolicited electronic messages in bulk, whether for commercial or non-commercial purpose. Sending unsolicited messages does not confine to netmails. It happens with postal scrap mails and junk fax. Spam by emails is the most often seen form of spamming on the Internet. Emails are delivered with contents or messages for commercial advertising. Because of the little cost on sending email emails in massive scale, Non-commercial junk emails are to a fault found.There is news about spamming, this time not on e-mail its on the cell phone. IT companies has condition up websites and send SMS to the cell phone users. Its selling point is free registration, but th ere is a hidden charge for each SMS. When the users register the account, it doer the comp whatever can send the SMS to the registered users and receive charges. And the federation sends 80 messages to a user within 1 hour each message cost HK$5, the user being charged more than ten thousand dollars a month. (--, 2010)2.2.1 Prevention and SolutionThe following solution and prevention are based on the E-mail spammingCheck the privacy policy of websites or companies before providing either personalized information when filling in some web registration forms, online surveys, etc.Check the terms and conditions of the email service more carefully, especially their privacy policy when subscribing to free email account services, when filling in the account profile.Open different email accounts for different purposes, like Gmail for school work, Hotmail for office work, etc.Simply delete emails from unknown senders because reply or click on the link in the email means the sender is conf irming that the email address is a valid one.Ask the ISPs for any anti-spam solution or install email filters to make a black list for reducing the amount of spam emails.2.2.2 Legal and Ethical issueIn Hong Kong, there doesnt does have any specific anti-spam legislation. But there are detailed guidelines on spam prevention found in a Code of Practice issued by the Hong Kong ISP Association (HKISPA) in 2000.The HKISPA asks its ISP members, to involve terms in their Internet access agreement that require the subscriber to not engage in sending spam messages. But it isnt a law.For the company, they send out junk mail is because they sine qua non to win their companys products or services. Bu they dont understand that this will cause problem to the one who received the junk mail. For who receive the mails demand to waste time on deleting the mails.Digital ForgeryDigital signatures help organizations sustain signer authenticity, accountability, data integrity and non-repudiation of e lectronic documents and forms.According to Will (2002), fashion website security certificates can be generated and used make sites appear secure when they are not, says a US computer programmer. The trick could tempt surfers into handing over personal information, such as credit card details.The forgery technique relies on the way Microsofts Internet Explorer handles the security certificates that verify the identity of a web site, says Mike Benham. These certificates are used to establish an encrypted connection to a web site so that private information can then be safely handed over.2.3.1Prevention and SolutionProvide different kinds of security certificates, like the digital signature and digital watermark. Also, all data for issuance encrypted into a metafile.Moreover, prevent come in any personal information on the Internet. And attempt not to download any unknown certificates and access to any unknown websites.2.3.2 Legal and Ethical issues forge a website security certifica te is not illegal, but using the fake certificate and try to collect others personal data may against the laws in Hong Kong. And there is no laws for just counterfeit the website security certificates.Its immoral for collect the personal data from others without their permission. And propose to counterfeit the website security certificates and replace the original one is also immoral. The malicious intent of doing is not acceptable.Identity theftThe identity theft usually cause by hackers. The hackers stole others personal information, like the credit card numbers, and for criminal uses.Manhattan prosecutors announced that they uncovered a large multinational group of credit card and identity theft. The defendants were charged with enterprise corruption, theft, money laundering, fraud, and other offenses. The crime syndicates used a multinational Internet company to carry out criminal activities from 2001 to 2007. They smuggling credit card numbers and others identity information fo r selling and earning profit. (-, 2009) The identity theft is usually caused by hacker.2.4.1 Prevention and SolutionFirst of all, handle the account and password carefully. Then encrypt data when transmitting personal information on the Internet. Moreover, dont reply or click any links embedded in unexpected e-mails. Last but not least, dont submit personal data on the Internet that may be irrelevant to the purposes of collection, such as credit card number.2.4.2 Legal and Ethical issuesIn Hong Kong, there is individualized Data (Privacy) Ordinance to protect the use of personal information. But posting others basic information on the Internet, like name, age, e-mail address or personal website is not a crime. Only stealing without permission for criminal use is illegal.The one who steal other personal information and use others information is immoral. They should admiration others privacy. But they dont respect it or may be lack of this kind of knowledge. So they may violate othe rs privacy. They are malicious intent.HactivismHactivism is a conference that holds by hackers. And they shared the current hack technologies on the conference.In 2002, there were about 2000 hackers from different countries gathered in New York. They held a big hactivism. At the conference, hackers pauperism to hold information guerilla warfare overdue to the dissatisfaction of network security for more than 20 countries. And develop out a new software system irradiation as a declaration of war. Then, the U.S. network security institutions and other large companies worried about the software. Because the new software is likely to become the tool for criminals or even terrorists for stealing trading secrets, and transferring terror information. (-, 2002)2.5.1 Prevention and SolutionThe large companies should be aware of the latest information about the hactivism, because they will announce any latest bug that they find. And the companies should try to keep update their software to fix the bug of their software. For the normal computer users, they should keep update their software and system to protect from being hacked.2.5.2 Legal and Ethical issuesHolding the conference actually is not illegal. And hacking the software is not illegal too. But publish those hacked software and cause any criminals to other then will be illegal. And hacking to other system is also illegal.The reasons why they hold the conference is due to challenge. They want to compete with other hackers and try to become the first to find out the bugs or problem of the software.Discussion on HackingAccording to George (2008), Apple wanted to hire a iPhone hacker to the company. The company wants to improve the security of the OS system. People may argue that why they hire a hacker to hack their system. But in my view, I entail hacking is beneficial to the companys products or services. The reason why Im saying this because hacking can draw the companys attention to their released products or services. Hacker will try to find out the bug from the system security and then attack the system. For the Apple case, people may jail break the iPhone and get the root management of the iPhone. Apple then want to hire the hacker to hack their system for improvement. So when the company found that their systems are being hacked. Then they will notice that their products are not perfect. So, they will try to keep update the system to avoid being hacked again. The company profit may be affected if their products can be easily hacked due to the comparison of the similar products from other companies. So the companies may keep improving their products and provide the best services to their customers. Thats why Im saying hacking is beneficial.3.1 Action to reduce hacking activitiesThere are some suggestions from the H.K. Government to reduce hacking activities. The suggestions are as followInstall the anti-virus software and personal firewall software on the computer devices.Keep upd ating the anti-virus software, because the outdated software can be easily hacked or affected by the new virus.Try not to install any unauthorized software on the computer.Turn off all JavaScript or ActiveX support in the web browser before visiting a un familiar websites.Apply the latest security updates and patches to the software.Disconnect from the Internet when not in use. Because connected to the Internet all the time has a high risk of infection, and has a greater fortune of being hacked.ConclusionComputer and Internet have brought us convenience to our daily. People should get well use of them. And try to avoid commit any computer crime. The computer users should aware of the latest news of computer crimes and protect their personal information. The Social and Schools should pay more attention on the computer crimes. And promote the proper way to use network resources.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.