The article indicates the threats of crime on the Internet and the specificity of criminals’ activities. Moreover, the content of the work shows how dynamically crime is changing on the Internet and it may affect all users. Nevertheless, the youngest are the most vulnerable to the actions of criminals because they can easily trust a perpetrator, who wants to commit a crime against a minor. Today, we all use different websites more frequently because the current pandemic situation in the world shows that both study, play and work only takes place in the virtual world (Hofmolk 2009).Online crime is now very dynamic and dangerous due to the high number of victims that were affected this type of online crime. Each of us could fall victim to hackers more than once in the network, however, we managed to react and prevent entry into our devices and data theft. The most dangerous thing is that the perpetrators are often anonymous because finding these people is almost impossible due to their skills in this area. The police have many mechanisms to combat this phenomenon, however, in many cases it is impossible to confirm who was the perpetrator of the incident online. Identification in the network is very difficult to detect because the perpetrators do not leave behind any signs such as: fingerprints, image or voice. The aim of the article was to indicate new forms of crime on the Internet and to show the broad spectrum of activities of offenders on the Internet. It was also indicated how big is the dynamics of crime and the emergence of newer and newer forms of online activity.
The elementary interest of every country is to maintain its inner security and stability. To achieve this goal the state must restrict within legal frameworks some fundamental rights of its own citizens. One of these fundamental rights is the right to privacy that can be breached only under certain circumstances. It is easy to see that it is unacceptable for a state not to control within the legal frameworks the communication of its own citizens so they can commit crimes, run terrorist rings, or spy rings or establish drug cartels without any consequences. Of course, the control over the communication is not the only means of the successful investigation but undeniably a vital one. That is why the Janus faced nature of the Dark Web is a real security risk nowadays. Although this new medium is the fruit of the last two decades its presence today is stronger than ever before and its popularity is growing day by day. Its most important features are anonymity, hidden geolocation and freedom from censorship. The Dark Web is very useful when it provides anonymity for political dissidents and whistleblowers, but is very harmful when it provides the same features for arm and drug traffickers and terrorists not to mention for pedophiles and so on. This article aims to shed some light on the effects of the Dark Web on the security and economy of the states especially in the aspects of organized crime and the terrorism.
User identifiers for financial transactions are widely used for personal identification numbers (PINs). PIN numbers are deposited at ATMs, card payments at POS terminals and electronic banking services. Bank card (ATM) credit card fraud has dramatically increased over the last decade. When analyzing the most common attacks and the reasons for successful frauds, it is clear that the main problem is PIN authentication, which itself does not produce any security features (except for the use of stars). This means that security is based solely on user behaviour. Research has focused on areas where personal protection and security is most failing, and that’s where the user is carrying a PIN along with a credit card, whether he or she changed the PIN on the payment card, and whether the PIN does not specify the date or year of his birth.
In accordance with the rise and rapid growth in e-commerce in the past few decades, the use of payment cards for online purchases has significantly increased in the payment cards market. This situation has led to an explosion in payment card fraud and it is costing billions of euros and dollars in losses in the card payment industry. The understanding of security has therefore undergone a significant development. Due to the inaccurate evaluation of their personal security status, people tend to underestimate the safety features related to the protection of their financial data on the internet. This claim is supported by the high level of interest that cyber attackers show in persons operating in the public and economic spheres. The collection and data analysis carried out suggests that the target sample group has not had experience with cyber-attacks, predominantly because this group was made up of ‘ordinary’ people, presumably outside of the cyber attackers’ sphere of interest. It is therefore important to further investigate the opinion and consumer approach to security and payment card fraud. As a result of rising losses, financial institutions and card issuers are constantly searching for new technologies and innovations in payment card fraud detection and prevention. This article provides several views on personal safety and quality of security to payment cars and cyber- attacks.The data collection and analysis was carried out in Slovakia via electronic sample surveys. With sample surveys the data is collected from a base sample unit, which in this case consisted of a sample of residents of the Slovak Republic. The research sample for this investigation consisted of 287 respondents, out of which there were 164 men (57,14%) and 123 women (42,86%). For the purposes of the analysis, the respondents were divided into categories, based on their age, level of education and occupation. The study results can help the issuers of payment cards and banks as well as clients using payment cards, especially in order to improve the prevention against fraud and the unauthorised use of payment cards.
In the last few decades, the understanding of security has been changing. New areas emerged which may influence security facets, which were not urgent earlier. Now those facets can endanger individual persons or even states. Breaches of cyber security, separate attacks or intense cyber wars are becoming more usual than conventional wars in the physical space; violations of cyber security may cause great damage, ruin businesses or even temporarily paralyze full-fledged functioning of individual states or regions. Many countries of the world, realizing that such a threat is real, adopted Cyber Security Strategies; for some countries, this is not the first version of such a strategy. This article examines the place of Cyber Security Strategies in the system of state documents, the nature and importance of such strategies as well as whether they are binding on individuals and institutions. The article explores in more detail the principles of ensuring cyber security provided for in such strategies, i.e. the principles identified by the states, as important for ensuring cyber security. It is discussed why these principles are so different in the strategies of individual states.