You are on page 1of 7

CHAPTER 1 Computer Crime (Phishing): Hacking To Money

1. Introduction

There seems to be little question that several sweeping changes in the overall state of I.T. practices couple with equally broad changes in the habits of criminal world are making significant, hardhitting attacks easier and more lucrative for their perpetrators (Richardson, 2013). Any use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.(Miriam-Webster). Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Computer crime is the biggest and broadly criminal acts have been committed using a computer of a user and also the principle tool. Even you talk about computer crimes they are usually mention or referring to the fact that computer either been the medium, object, subject or the instrument of a crime. While the changes in technology prior to computers did provide individuals with opportunities to commit new crimes or made it easier to commit traditional crimes, the threats posed to society by the use of technology remained acceptable and could generally be managed by local or state law enforcement. For the further distinction, we can made crime purely incidentally that is the one role of a computer. These include such as a traditional crimes like fraud, piracy, forgery, extortion, theft and pornogr aphy. Moreover, the worldwide reach of the Internet allows a cybercriminal to cause harm to thousands, if not millions, of victims that may not even be located in the same geographic area. However, with the proliferation of the personal computer and the worldwide interconnection of such computers through the Internet, modern computer crime presents risks to society and unique challenges to the law enforcement than in the past.

Perhaps the most prominent form of computer crime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "steal" another person's identity. Let us know what is phishing? It is the ability to try to catch a fish into a body of water; just a piece of joke. Generally speaking phishing means a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly. Just like what is stated above phishing is a kind of computer crime where computer criminals asked to enter personal information of the victim, which includes login information. Which the phisher (the hacker) can use the details to steal the victim identity.

1.1. Rationale for this Research Into our current era, there are lots of user of computers, thus computer remarkably makes our task easier and time saver. Computer and Internet Connection are those essential elements into our current generation. It is more likely used for entertainment purposes just like for example the social media sites; Facebook, Twitter, Multiply, Tumblr, and many more. In part there are many computer criminals that looking for their victims. As a researcher conducting a research about computer crimes this study aims to know more about computer crime and to know how computer criminals do their act to victim innocent peoples by using computer. And other crimes did by computer criminals.

1.2. Statement of the Problem

Phishing and Identity Thief are the most growing crimes around the world. Which cyber criminals usurping the identity of their victim whether for the purpose of theft, fraud or other malicious activities.

1. What is phishing? 2. What are the categories uses by phishers? 3. What are the methods used by phisher to know their victims? 4. How phishers attack their victims?

1.3. Objectives In this research it aims to know more about phishing and identity thief to be aware with those possibilities if we became a victim of it. Since cyber criminals target everyone those with access to the internet. Almost two thirds of internet users have been victim of some sort of computer crimes. Nevertheless, most of it are opportunistic they will only attack and vulnerable targets to have their goals or need. a. To know more about phishing b. To know more about the techniques and countermeasures of the cyber criminals.
c. To know the safety measures to avoid a victim of computer crime

1.4. Methods The researcher will prefer to use the Descriptive method. A research method which gathering or collects data to interpret the point of view of some objectives and other details about the study. In these method it focuses on details which are significant on what is described. In this method of collecting data in this research it remains simple. It is because it focuses on analyzing details to described .

1.5 Structure of the research


It can be difficult to write up a research study or dissertation, creating a structure or plan is a good starting point. This will help you to visualize the finished study, and to recognize the process to follow. This research paper focuses to the method and results sections that are more detailed and specific, providing support in the introduction. This will have conclusions and recommendations. Also, this research paper will be open for comments and suggestion, for this research paper to be a better one.

You might also like