The term cyber crime has no certain definition. Generally speaking, cyber crime can be referred to as any illegal conduct that takes place though the medium of a computer or networks of computer. Some school of thoughts have emphasized on the fact that the illegal conduct that takes place on the internet can eventually lead to a comprehensive crime taking place at a larger level.
Victimization in society results from many types of harmful behaviors committed by individuals or groups against other people. Behaviors considered negligent or abusive, or that otherwise are considered criminal in a particular place, often depends on the amount of harm inflicted, the technological means employed, and existing laws that forbid specific activities. Technological means used to commit cyber offenses refers to a combination of networked systems, hardware devices, software tools, and methods that people use on the Internet. Modern information technology (IT) hardware like computers, personal digital assistants (PDAs), cellular phones, and gaming devices can be used offline (in standalone mode), online, or wirelessly, from private or public places, in ways that are not easily recognized as illegal and that transcend more the one geopolitical or legal jurisdiction. In addition, illicit use of computing devices can facilitate many forms of traditional in-person crimes.
To fully understand cyber and Internet offenses, it is necessary to consider (1) the ways in which computerized devices and telecommunications systems came to be increasingly used for illicit purposes, (2) the myriad forms of online abuse and crime now taking place in our interconnected world, (3) the categories of people and organizations likely to fall prey to online forms of abuse and crime, (4) the social and economic impact of cyber and Internet offenses, and (5) what is being done to help prevent cyber offenses and provide services to victims of cybercrime (Logweller, 2009).
Answer-1
The Internet has been used widely nowadays. It has been used in every field of life such as business, communication, education and so on. Security measures that are taken to provide protection of computers as well as the computer networks from malicious harm—is an ongoing and a routine process. It can be said that the security of a computer is only strong as its weakest link. Upon correction of the fault the system is bound to become stronger. This state or phase is said to be transient similar to the other faults which are ultimately detected and then exploited.
Therefore, the Internet becomes one of the most important things that people need in our life. Because of its importance, it has many threats that should be taken into account, because these threats can affect the personal computers and the data stored on these computers. As a result, there is a need to make these computers and data secured .The question that people have to answered now is what is the Internet security?
Internet security became one of the most threats that many people care of when they are connecting to the Internet, because there are some hackers ...