You are on page 1of 4

Name : Ma Cristina R.

Cornelio BSCS B41 Evening

Cyber crime is the new breed of crime, which is either perpetrated using computers, or is otherwise related to them. Its origin can be traced to the growing dependence on computers in modern life. Cyber crime has assumed sinister implications today as everything from microwave ovens and refrigerators to nuclear power plants is being run on computers.

Today, the world is moving towards a point where everything from banking stock exchanges, are traffic control, telephones to electric power, health care, welfare and education depends on software. This exponential growth, and the increase in the capacity and accessibility of computers coupled with the decrease in cost, has brought about revolutionary changes in every aspect of human civilization, including crime.

As a result, the increased capacities of information systems today come at the cost of increased vu Inerrability. Information technology has begun to produce criminal opportunities of a variety that the brightest criminals of yore could not even begin to dream about.

A cyber crime may be theft o ~f information services, communications in furtherance of criminal conspiracies, telecommunications piracy, electronic money laundering, electronic vandalism and terrorism, sales and investment fraud, illegal interception of telecommunications, and electronic funds transfer fraud. The precedent for theft of information services was set by the 'phone breakers' more than three decades ago for what has become a major criminal industry. In this method of crime, the perpetrators gain access to the PBX board of an organization, and make their own calls or sell call time to third parties.

The advent of information technology has enhanced the activities the right middleware, a cloud computing system could execute all the programs a normal computer could run. Potentially, everything from generic word processing software to customized computer programs designed for a specific company could work on a cloud computing system.

It is a good idea to rely on another computer system to run programs and store data as it would enable clients to access their applications and data from anywhere at any time. They could access the cloud computing system using any computer linked to the Internet. Data would not be confined to a hard drive on one user's computer or even a corporation's internal network. Also, it could bring hardware costs down as the client would not need to buy the fastest computer with the most memory, because the cloud system would take care of the rest.

Instead, a client could buy an inexpensive computer terminal with a monitor, a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system.

If the cloud computing system's back end is a grid computing system, then the client could take advantage of the entire network's processing power. Often, scientists and researchers work with calculations so complex that it would take years for individual computers to complete them. On a grid computing system, the client could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers on the back end, significantly speeding up the calculation.

While the benefits of cloud computing seem convincing, security and privacy are perhaps its biggest concerns. The idea of handing over important data to another company worries some people. Corporate executives might hesitate to take advantage of a cloud computing system because it would not allow them to keep their company's information under lock and key.

The counterargument to this position is that the companies offering cloud computing services live and die by their reputations. It benefits these companies to have reliable security measures in place. Otherwise, the service would lose all its clients. Hence, it's in their interest to employ the most advanced techniques to protect their clients' data.

Cloud computing companies will need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format whereby each user can access only the data and applications relevant to his or her job. Then there are a few standard hacker tricks that could cause

In a cloud computing system, there is a significant workload shift. Instead of local computers, the network of computers that make up the cloud do all the heavy lifting when it comes to running

applications. This results in decrease of hardware and software demands on the user's side. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a Web browser, and the cloud's network takes care of the rest.

Web- based e-mail service like Hotmail, Yahoo! Mail or Gmail do not run an e-mail program on your computer, you log in to a Web e-mail account remotely. The software and storage for your account does not exist on your computer but on the service's computer cloud.

Although cloud computing is an emerging field, the idea has been around for a few years. It is called cloud computing because the data and applications exist on a 'cloud' of Web servers. A cloud computing system can be divided into two sections: the front end and the back end. They connect to each other through a network, usually the Internet. The front end is the side the computer user, or client, sees. It includes the client's computer (or computer network) and the application required to access the cloud computing system.

The Effect of Cyber Crime Law in Online Business, Bloggers and Technology

Loss Of Revenue One of the main effects of cyber crime on a company is a loss of revenue. This loss can be caused by an outside party who obtains sensitive financial information, using it to withdraw funds from an organization. It can also occur when a business's e-commerce site becomes compromised--while inoperable, valuable income is lost when consumers are unable to use the site.

Wasted Time Another major effect or consequence of cyber crime is the time that is wasted when IT personnel must devote great portions of their day handling such incidences. Rather than working on productive measures for an organization, many IT staff members spend a large percentage of their time handling security breaches and other problems associated with cyber crime.

Damaged Reputations

In cases where customer records are compromised by a security breach associated with cyber crime, a company's reputation can take a major hit. Customers whose credit cards or other financial data become intercepted by hackers or other infiltrators lose confidence in an organization and often begin taking their business elsewhere.

Reduced Productivity Due to the measures that many companies must implement to counteract cyber crime, there is often a negative effect on employees' productivity. This is because, due to security measures, employees must enter more passwords and perform other time-consuming acts in order to do their jobs. Every second wasted performing these tasks is a second not spent working in a productive manner.