References
Links were all checked for credibility and compared against similar websites to ensure information is accurate.
1. http://now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrime/index.html
2. http://www.selectitschools.com/Articles/tabid/67/EntryId/3/Six-Common-Types-of-Cyber-Crime.aspx
3. http://www.urbandictionary.com/define.php?term=flaming
4. http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
5. http://searchsecurity.techtarget.com/definition/email-spoofing
6. http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
7. http://www.gfi.com/whitepapers/cyber-attacks.pdf
8. http://www.hp.com/hpinfo/newsroom/press/2012/121008a.html
9. http://hackingexpose.blogspot.sg/2012/12/cybercrime-2012-malware-attacks.html
10. https://docs.google.com/viewer?a=v&q=cache:LFLKMcoVcrgJ:now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrimeReport/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf+Norton
11. http://searchsecurity.techtarget.com/definition/firewall
12. http://www.xing.com/net/trojannetworks/news-225979/some-cybercrime-gangs-will-even-offer-consultants-to-help-you-set-it-up-hire-money-mules-and-give-you-a-target-to-attack-42088020
13. http://www.businessweek.com/articles/2012-08-02/the-cost-of-cyber-crime
14. http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/
15. https://www.fcbresource.com/SecurityCenter/What-can-identity-thieves-do-with-stolen-personal-.aspx
16. http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html
17. http://www.explainingcomputers.com/security.html
18. http://www.ehow.com/about_5052659_effects-cyber-crime.html
19. http://www.ehow.com/about_5286381_causes-cyber-crime.html
20. http://www.informit.com/articles/article.aspx?p=1160835
21. http://www.networksecurity.com/the-economic-motive-for-cyber-crimes/
22. http://www.pctools.com/security-news/political-hacktivism/
23. http://www.techrepublic.com/blog/security/profiling-and-categorizing-cybercriminals/4069
24. http://www.sodahead.com/united-states/recession-pushes-computer-geeks-into-cybercrime-for-revenge/blog-48687/
25. http://library.thinkquest.org/04oct/00460/crimeMotives.html
26. http://en.kioskea.net/contents/secu/secuintro.php3
27. http://www.makeuseof.com/tag/7-top-firewall-programs-computers-security/
28. http://suitcaseentrepreneur.com/business-tools/getting-serious-about-security-measures-for-your-online-business/
29. http://findbiometrics.com/applications/biometrics-security/
30. http://searchsecurity.techtarget.com/definition/security-token
31. http://suitcaseentrepreneur.com/business-tools/getting-serious-about-security-measures-for-your-online-business/
32. http://www.makeuseof.com/tag/create-strong-password-forget/
33. http://money.cnn.com/galleries/2011/technology/1107/gallery.common_hacks/?iid=EL
34. http://en.wikipedia.org/wiki/Hamas
35. http://www.bloomberg.com/news/2012-09-28/cyber-attacks-on-u-s-banks-expose-computer-vulnerability.html
36. http://www.foxbusiness.com/industries/2012/12/11/cyber-terrorists-threaten-fresh-attacks-against-us-banks/
37. http://www.youtube.com/watch?v=iil7W_0xAEc
38. http://crave.cnet.co.uk/gamesgear/sony-loses-70-million-users-details-in-colossal-playstation-network-hack-50003603/
39. http://www.infosecisland.com/blogview/13337-Sony-PlayStation-Hack-70-Million-Users-Details-Stolen.html
40. http://www.wired.com/gamelife/2011/04/playstation-network-hacked/
41. http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/
42. http://www.youtube.com/watch?v=wCK3zzgN-ds
43. http://www.gmanetwork.com/news/story/275059/opinion/feedback/your-say-online-reactions-to-the-anti-cybercrime-law
44. http://community.norton.com/t5/Cybercrime-Frontline-Blog/The-Police-View-of-Cybercrime/ba-p/490680
1. http://now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrime/index.html
2. http://www.selectitschools.com/Articles/tabid/67/EntryId/3/Six-Common-Types-of-Cyber-Crime.aspx
3. http://www.urbandictionary.com/define.php?term=flaming
4. http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx
5. http://searchsecurity.techtarget.com/definition/email-spoofing
6. http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack
7. http://www.gfi.com/whitepapers/cyber-attacks.pdf
8. http://www.hp.com/hpinfo/newsroom/press/2012/121008a.html
9. http://hackingexpose.blogspot.sg/2012/12/cybercrime-2012-malware-attacks.html
10. https://docs.google.com/viewer?a=v&q=cache:LFLKMcoVcrgJ:now-static.norton.com/now/en/pu/images/Promotions/2012/cybercrimeReport/2012_Norton_Cybercrime_Report_Master_FINAL_050912.pdf+Norton
11. http://searchsecurity.techtarget.com/definition/firewall
12. http://www.xing.com/net/trojannetworks/news-225979/some-cybercrime-gangs-will-even-offer-consultants-to-help-you-set-it-up-hire-money-mules-and-give-you-a-target-to-attack-42088020
13. http://www.businessweek.com/articles/2012-08-02/the-cost-of-cyber-crime
14. http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/
15. https://www.fcbresource.com/SecurityCenter/What-can-identity-thieves-do-with-stolen-personal-.aspx
16. http://securityaffairs.co/wordpress/4631/cyber-crime/analysis-of-cybercrime-and-its-impact-on-private-and-military-sectors.html
17. http://www.explainingcomputers.com/security.html
18. http://www.ehow.com/about_5052659_effects-cyber-crime.html
19. http://www.ehow.com/about_5286381_causes-cyber-crime.html
20. http://www.informit.com/articles/article.aspx?p=1160835
21. http://www.networksecurity.com/the-economic-motive-for-cyber-crimes/
22. http://www.pctools.com/security-news/political-hacktivism/
23. http://www.techrepublic.com/blog/security/profiling-and-categorizing-cybercriminals/4069
24. http://www.sodahead.com/united-states/recession-pushes-computer-geeks-into-cybercrime-for-revenge/blog-48687/
25. http://library.thinkquest.org/04oct/00460/crimeMotives.html
26. http://en.kioskea.net/contents/secu/secuintro.php3
27. http://www.makeuseof.com/tag/7-top-firewall-programs-computers-security/
28. http://suitcaseentrepreneur.com/business-tools/getting-serious-about-security-measures-for-your-online-business/
29. http://findbiometrics.com/applications/biometrics-security/
30. http://searchsecurity.techtarget.com/definition/security-token
31. http://suitcaseentrepreneur.com/business-tools/getting-serious-about-security-measures-for-your-online-business/
32. http://www.makeuseof.com/tag/create-strong-password-forget/
33. http://money.cnn.com/galleries/2011/technology/1107/gallery.common_hacks/?iid=EL
34. http://en.wikipedia.org/wiki/Hamas
35. http://www.bloomberg.com/news/2012-09-28/cyber-attacks-on-u-s-banks-expose-computer-vulnerability.html
36. http://www.foxbusiness.com/industries/2012/12/11/cyber-terrorists-threaten-fresh-attacks-against-us-banks/
37. http://www.youtube.com/watch?v=iil7W_0xAEc
38. http://crave.cnet.co.uk/gamesgear/sony-loses-70-million-users-details-in-colossal-playstation-network-hack-50003603/
39. http://www.infosecisland.com/blogview/13337-Sony-PlayStation-Hack-70-Million-Users-Details-Stolen.html
40. http://www.wired.com/gamelife/2011/04/playstation-network-hacked/
41. http://www.wired.com/gamelife/2011/05/sony-online-entertainment-hack/
42. http://www.youtube.com/watch?v=wCK3zzgN-ds
43. http://www.gmanetwork.com/news/story/275059/opinion/feedback/your-say-online-reactions-to-the-anti-cybercrime-law
44. http://community.norton.com/t5/Cybercrime-Frontline-Blog/The-Police-View-of-Cybercrime/ba-p/490680