create account

Cybercrime by zahidsun

View this thread on: hive.blogpeakd.comecency.com
· @zahidsun ·
$0.02
Cybercrime
<html>
<p><em><strong>Cyber crime, or computer related crime, is crime that involves a </strong></em><a href="https://en.wikipedia.org/wiki/Computer"><em><strong>computer</strong></em></a><em><strong> and a </strong></em><a href="https://en.wikipedia.org/wiki/Computer_network"><em><strong>network</strong></em></a><em><strong>.</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-moore-1"><em><strong>[1]</strong></em></a><em><strong> The computer may have been used in the commission of a crime, or it may be the target.</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-kruse-2"><em><strong>[2]</strong></em></a><em><strong> Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)".</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-igiglobal.com-3"><em><strong>[3]</strong></em></a><em><strong> Cybercrime may threaten a person or a nation's security and financial health.</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-4"><em><strong>[4]</strong></em></a><em><strong> Issues surrounding these types of crimes have become high-profile, particularly those surrounding </strong></em><a href="https://en.wikipedia.org/wiki/Hacker_(computer_security)"><em><strong>hacking</strong></em></a><em><strong>, </strong></em><a href="https://en.wikipedia.org/wiki/Copyright_infringement"><em><strong>copyright infringement</strong></em></a><em><strong>, </strong></em><a href="https://en.wikipedia.org/wiki/Mass_surveillance"><em><strong>unwarranted mass-surveillance</strong></em></a><em><strong>, </strong></em><a href="https://en.wikipedia.org/wiki/Child_pornography"><em><strong>child pornography</strong></em></a><em><strong>, and </strong></em><a href="https://en.wikipedia.org/wiki/Child_grooming"><em><strong>child grooming</strong></em></a><em><strong>. There are also problems of </strong></em><a href="https://en.wikipedia.org/wiki/Privacy"><em><strong>privacy</strong></em></a><em><strong> when </strong></em><a href="https://en.wikipedia.org/wiki/Confidential"><em><strong>confidential</strong></em></a><em><strong> information is intercepted or disclosed, lawfully or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones".</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-igiglobal.com-3"><em><strong>[3]</strong></em></a><em><strong> Internationally, both governmental and non-state actors engage in cybercrimes, including </strong></em><a href="https://en.wikipedia.org/wiki/Espionage"><em><strong>espionage</strong></em></a><em><strong>, </strong></em><a href="https://en.wikipedia.org/wiki/Theft"><em><strong>financial theft</strong></em></a><em><strong>, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as </strong></em><a href="https://en.wikipedia.org/wiki/Cyberwarfare"><em><strong>cyberwarfare</strong></em></a><em><strong>.A report (sponsored by </strong></em><a href="https://en.wikipedia.org/wiki/McAfee"><em><strong>McAfee</strong></em></a><em><strong>) estimates that the annual damage to the global economy is at $445 billion;</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-5"><em><strong>[5]</strong></em></a><em><strong> however, a Microsoft report shows that such survey-based estimates are "hopelessly flawed" and exaggerate the true losses by orders of magnitude.</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-6"><em><strong>[6]</strong></em></a><em><strong>[</strong></em><a href="https://en.wikipedia.org/wiki/Wikipedia:Independent_sources"><em><strong>third-party source needed</strong></em></a><em><strong>] Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US.</strong></em><a href="https://en.wikipedia.org/wiki/Cybercrime#cite_note-7"><em><strong>[7]</strong></em></a><em><strong> In 2016, a study by Juniper Research estimated that the costs of cybercrime could be as high as 2.1 trillion by 2019.</strong></em></p>
</html>
👍  , , , , , , , , , , , , , ,
properties (23)
authorzahidsun
permlinkcybercrime
categoryhacking
json_metadata{"tags":["hacking"],"links":["https://en.wikipedia.org/wiki/Computer","https://en.wikipedia.org/wiki/Computer_network","https://en.wikipedia.org/wiki/Cybercrime#cite_note-moore-1","https://en.wikipedia.org/wiki/Cybercrime#cite_note-kruse-2","https://en.wikipedia.org/wiki/Cybercrime#cite_note-igiglobal.com-3","https://en.wikipedia.org/wiki/Cybercrime#cite_note-4","https://en.wikipedia.org/wiki/Hacker_(computer_security)","https://en.wikipedia.org/wiki/Copyright_infringement","https://en.wikipedia.org/wiki/Mass_surveillance","https://en.wikipedia.org/wiki/Child_pornography","https://en.wikipedia.org/wiki/Child_grooming","https://en.wikipedia.org/wiki/Privacy","https://en.wikipedia.org/wiki/Confidential","https://en.wikipedia.org/wiki/Espionage","https://en.wikipedia.org/wiki/Theft","https://en.wikipedia.org/wiki/Cyberwarfare","https://en.wikipedia.org/wiki/McAfee","https://en.wikipedia.org/wiki/Cybercrime#cite_note-5","https://en.wikipedia.org/wiki/Cybercrime#cite_note-6","https://en.wikipedia.org/wiki/Wikipedia:Independent_sources","https://en.wikipedia.org/wiki/Cybercrime#cite_note-7"],"app":"steemit/0.1","format":"html"}
created2017-10-16 12:54:15
last_update2017-10-16 12:54:15
depth0
children5
last_payout2017-10-23 12:54:15
cashout_time1969-12-31 23:59:59
total_payout_value0.021 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4,731
author_reputation58,170,628,473,644
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd0
post_id17,821,661
net_rshares9,404,323,446
author_curate_reward""
vote details (15)
@amitraj ·
Ya this is real fact  nice fact.
properties (22)
authoramitraj
permlinkre-zahidsun-cybercrime-20171016t163907085z
categoryhacking
json_metadata{"tags":["hacking"],"app":"steemit/0.1"}
created2017-10-16 16:39:15
last_update2017-10-16 16:39:15
depth1
children0
last_payout2017-10-23 16:39:15
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length32
author_reputation28,784,246,628,333
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id17,836,069
net_rshares0
@cheetah ·
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
`https://www.youtube.com/watch?v=c2UJD51-o5c`
properties (22)
authorcheetah
permlinkcheetah-re-zahidsuncybercrime
categoryhacking
json_metadata""
created2017-10-16 12:54:45
last_update2017-10-16 12:54:45
depth1
children0
last_payout2017-10-23 12:54:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length144
author_reputation942,693,160,055,713
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id17,821,697
net_rshares0
@mdfoysal ·
I upvoted and comment for you. Please upvote and comment for helping me grow @mdfoysal
properties (22)
authormdfoysal
permlinkre-zahidsun-cybercrime-20171016t150642266z
categoryhacking
json_metadata{"tags":["hacking"],"users":["mdfoysal"],"app":"steemit/0.1"}
created2017-10-16 15:06:42
last_update2017-10-16 15:06:42
depth1
children0
last_payout2017-10-23 15:06:42
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length86
author_reputation138,772,344,169
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id17,830,774
net_rshares0
@msaadil019 ·
So nice
properties (22)
authormsaadil019
permlinkre-zahidsun-cybercrime-20171017t034830828z
categoryhacking
json_metadata{"tags":["hacking"],"app":"steemit/0.1"}
created2017-10-17 03:48:33
last_update2017-10-17 03:48:33
depth1
children0
last_payout2017-10-24 03:48:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length7
author_reputation5,854,329,825
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id17,871,506
net_rshares0
@tanweer ·
Like
properties (22)
authortanweer
permlinkre-zahidsun-cybercrime-20171016t143256320z
categoryhacking
json_metadata{"tags":["hacking"],"app":"steemit/0.1"}
created2017-10-16 14:33:03
last_update2017-10-16 14:33:03
depth1
children0
last_payout2017-10-23 14:33:03
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length4
author_reputation4,420,987,161
root_titleCybercrime
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id17,828,517
net_rshares0