Cybercrimes Technologies and Approaches

Cybercrimes Technologies and Approaches

WeSam Musa
Copyright: © 2017 |Pages: 19
ISBN13: 9781522508083|ISBN10: 1522508082|EISBN13: 9781522508090
DOI: 10.4018/978-1-5225-0808-3.ch012
Cite Chapter Cite Chapter

MLA

Musa, WeSam. "Cybercrimes Technologies and Approaches." Identity Theft: Breakthroughs in Research and Practice, edited by Information Resources Management Association, IGI Global, 2017, pp. 248-266. https://doi.org/10.4018/978-1-5225-0808-3.ch012

APA

Musa, W. (2017). Cybercrimes Technologies and Approaches. In I. Management Association (Ed.), Identity Theft: Breakthroughs in Research and Practice (pp. 248-266). IGI Global. https://doi.org/10.4018/978-1-5225-0808-3.ch012

Chicago

Musa, WeSam. "Cybercrimes Technologies and Approaches." In Identity Theft: Breakthroughs in Research and Practice, edited by Information Resources Management Association, 248-266. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0808-3.ch012

Export Reference

Mendeley
Favorite

Abstract

The growth of the Internet has changed our lives significantly. Not so long ago, computers used to be viewed as luxury items to have at home. People used to rely mainly on televisions and newspapers as the primary sources of news. Today, the Internet has become an essential service to depend on for many industries, such as news agencies, airports, and even utility companies. This was the beginning of a new-trillion-dollar industry: the Internet industry. However, the Internet was designed to be an open, academic tool, never to be secure. As a result, cybercrimes, cyber warfare, and other cyber illegal activities have spread to become a significant portion of Internet traffic. Cybercrimes often challenge law enforcement. It is difficult to know the exact location where an attack originated, and there are no cyber borders between nations. As a result, fighting cybercrimes requires international cooperation. The purpose of this chapter is to shed some light on motives of cybercrimes, technologies used by hackers, and solutions that can be adopted by individuals, organizations, and governments. This chapter also presents the United States (USA) and international perspectives on cybercrimes and privacy laws. In summary, individuals, organizations, and nations have roles to play in achieving security and reducing cyber risks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.