Read-only is a designation for any object or construct which can no longer be altered after creation, it can only be read. This can refer to both hardware and software constructs such as read-only memory chips like BIOS and CMOS and CD/DVD/Blu-ray-ROMs for hardware, and read-only files for software constructs. In either case the contents of the...
Internet crime is any crime or illegal online activity committed on the Internet, through the Internet or using the Internet. The widespread Internet crime phenomenon encompasses multiple global levels of legislation and oversight. In the demanding and continuously changing IT field, security experts are committed to combating Internet crime through preventative technologies, such as intrusion detection networks and packet sniffers. Internet crime is a strong branch of cybercrime. Identity theft, Internet scams and cyberstalking are the primary types of Internet crime. Because Internet crimes usually engage people from various geographic areas, finding and penalizing guilty participants is complicated.
Internet crimes, such as the Nigerian 419 fraud ring, are a constant threat to Internet users. The U.S. Federal Bureau of Investigation (FBI) and Federal Trade Commission (FCC) have dedicated and appointed IT and law enforcement experts charged with ending the far-reaching and damaging effects of Internet crime. Examples of Internet crime legislation include:
As the U.S. works to combat Internet crime, other countries are experiencing increased cybercriminal activity. In 2001, Websense (an organization focused on network abuse research) reported the alarming spread of Internet crime in Canada. This global shift is under review by the Canadian government. Types of Internet crime include:
To prevent becoming an Internet crime, online vigilance and common sense are critical. Under no circumstances should a user share personal information (like full name, address, birth date and Social Security number) to unknown recipients. Moreover, while online, a user should remain suspicious about exaggerated or unverifiable claims.
Read More »
Join 138,000+ IT pros on our weekly newsletter
Home | Advertising Info | Write for Us | About | Contact Us
2010 - 2014
Janalta Interactive Sites: