Page 18 - issue-25 - en
P. 18
ELITE Vol.1 No.25, Nov. 2020
Cybercrime
Marwa mahdy
Third Level, Political Science
The Internet has expanded and is no longer restricted to the dissemination of private or perverted information with the
intention of assassinating or abusing individuals, espionage,
purposes of scientific research but has been expanded to cover
and the interception of information and the attempt to find out
all spheres of life that give rise to crimes resulting from its
what individuals are doing,sexual harassment and intended
use.These crimes are either inflicted on the computer itself with
harassment through text ,Child pornography includes the
the intent to destroy it or they are caused by the computer which
publication of special images of children "tourism sex ",
becomes a tool for the offender to use for his criminal purposes
number theft and trafficking, especially secret phone
Numbers, cyberterrorism and includes all the above
or what is termed "cybercrime".
components in a changing technical environment
The problem lies in the growth of cybercrime and the increase
A number of ways to combat cybercrime include: the need to
in its losses which have become a real threat to information use antivirus programmes, to eliminate the use of a simple
2018-2020 legislation to keep pace with developments
security in all vital and public spheres. Indeed, the use of the
password,
enact
to
Internet for terrorist activities poses a danger to national
in cybercrime and to bring national legislation into line with
security and international peace and security.
international conventions in order to enable criminal justice
agencies to play their role at the national and regional levels in
a way that will contribute to the effective fight against
There is no consensus on the definition of cybercrime due to the
cybercrime, and to train and qualify digital evidence
complexity of the directions that they have addressed but it can
professionals and improve their performance. Follow all
be said to be an assault on stored computer data.It is a technical
security alerts to reduce the risk of cybercrime, keep backup
crime that arises clandestinely by intelligent criminals with the
copies of all sensitive information on off-line disks, verify the
identity of the senders when the E-mail is opened.
tools of technical knowledge and directed to get information.
Cybercrime distinguishes from other crimes as transspatial,
The best-known cybercrime: the NASA hack in which 16-
Cybercrime is a socially adaptive and intelligent criminal while
year-old Jonathan James accessed Marshall space center data
the classical perpetrator is a simple illiterate person, It also
system and uploaded the source code that contained the
occurs in the field of automated information processing and
workings of Nasa in 1999. According to NASA reports about
targets morale rather than material, Victims are reluctant to the case, the value of the files stolen was us $1.7 million. In
order to stop the attack, the agency had to shut down the
report for fear of defamation,the speed of erase evidence and
system and restart it, causing an estimated loss of us $41,000.
the availability of technical means to block access are
James was arrested quickly but managed to avoid prison as a
considered and less violent in execution.
result of his youth.
Finally,cybercrime is one of the most serious crimes the world
There are many ways in which cybercrime involves: stealing
has ever known, changing its traditional view of crime in
inventions to use or sale, Defamation includes the use and general.
17