The world has become increasingly run by technology. Technology has benefited society and prompted new methods of research and development. Even with its many benefits, the use of technology has led to the growth of cybercrime. Cybercrime is one of the fastest types of growing crime (Anderson, 2013). With the continued growth of the technology industry, the crime rate will continue to skyrocket (Ellyatt, 2013).
One of the most common types of cybercrime is identity theft. Identity theft occurs when someone steals another individual’s personal information, with the intent to illegally use the date for their personal benefit (Dimov, 2014). Sadly, it is not hard for an individual to steal another person’s identity. All one needs is an individual’s name, date of birth, and Social Security Number (Dimov, 2014). These three pieces of personal detail are often deemed the “Holy Trinity.” Perpetrators often use this type of personal information to commit financial fraud, such as applying for credit cards in the victim’s name (Baltzan, 2013, p. 294).
According to Paige Baltzan, there are two methods criminals use to steal one’s personal identity (2013, p. 294). One of these methods is phishing. This occurs when the perpetrator steals the victim’s personal information by using fake emails, which commonly ask for personal details (Baltzan, 2013, p. 294). Unknowingly, victims often think these emails are legitimate, and reply with personal information. Once they have replied, the perpetrator has captured their personal information. The second way identity thieves capture information wanted is by pharming (Baltzan, 2013). This method reroutes victims from legitimate websites to false websites (Baltzan, 2013, p. 296). The same concept applies to this situation. If personal information is entered into the false website, it can be used for fraudulent purposes.
Not only can technology be used to commit crimes such as identity theft and fraud, but technology is often used by hackers to steal a company’s intellectual property (Baltzan, 2013). These criminals use their knowledge of technology to break into one’s personal computer system to steal information. There are multiple types of hackers, such as script kiddies, white-hat hackers, and black-hat hackers (Siciliano, 2011). Each type of hacker has different intentions. Hackers often attack systems using viruses, adware, and spyware to capture personal information (Baltzan, 2013). A virus is “software written with malicious intent to cause damage or annoyance” (Baltzan, 2013, p. 293). Viruses can damage an entire system, if the proper information security policies are not put into place. Adware is a type of software that supports a useful function but allows Internet advertisers to display advertisements without proper consent (Baltzan, 2013). Spyware is a type of adware that secretly collects information about the computer’s user and sends it over the Internet without the user’s knowledge (Baltzan,...