Tuesday, June 4, 2019

Cyber Crimes and Cyber Security

Cyber Crimes and Cyber SecurityJackalynn E. SellersAbstractCyber related crimes are increasing at a rapid rate across the world. Hacking and viruses are used to steal crucial personal instruction. Understanding cyber-crime is essential to understand how criminals are using the Internet to rehearse various crimes and what fucking be done to prevent these crimes from happening. This paper give cover different cyber-crimes and information on what the average Internet user can do to entertain themselves from falling victim to cyber-crimes.Keywords Cyber Security, Cyber CrimeThe Internet is a place saturated with information and over the years, information has become more intimately entrance moneyible than ever before. How much information that is chosen to be shared on the Internet should be carefully considered. A simple post to each social media site could give out more personal information than originally intended. Cyber security is a priority with the growing use and ease o f access of the Internet. If an internet user is not careful about the information given over to cyberspace, the users identity could easily be stolen or their finances drained. Cyber security is important not just to the government but also to the average user.Cyber CrimeTo understand why cyber security is needed and important, an understanding of cybercrime is required. Cybercrime is any illicit performance that is performed on the Internet or any network-based device. These crimes include identity theft, viruses, cyber stalking, and phishing.Identity TheftIdentity theft occurs when a hacker steals information from personal accounts such(prenominal) as banking information, social security numbers, and addresses. The hacker will then use this information to create accounts in the victims name. Being aware of encrypted websites and having adequate measures of protection when imputing this information into websites is essential to even the less-than average user of internet.VirusesC omputer viruses are pieces of code that are usually attached to downloadable files. When the file is running the code of the virus activates and reward to spread throughout computer files. These viruses infect vital information and can lead to deletion or corruption of important system files. Some viruses will also allow personal information and files to be accessed by another user.Cyber StalkingCyber stalking is a crime that occurs when a person is being nettle by another person in an online setting. The victim is often bombarded with messages not just to themselves, but also to family members or friends. Threats are often received by the victim as a tactic to get the victim to reply. Often the victim will suffer from anxiety and fear.PhishingPhishing is a crime where electronic transport is sent to the victim that mimics banking institutions or other financial or personal information accounts. The victim, if not careful, will enter their personal information on a site that mimi cs very closely the website used for personal information. It is important for a potential victim to be aware of email addresses associated with bank accounts and other sites that may contain personal information.ConclusionThe increase on cyber-attacks all over the world is pressing the need for updated cyber security. The United States created the Computer Emergency Response police squad (CERT) in 1988 after a wide-spread break in of the Internet. The CERT has no authority to arrest or prosecute hackers but it does provide constant security of planetary information on the Internet. Interpol has also set up the I-24/7 communication system for internet-based policing to report any crimes found.Altogether, the average user of the Internet can protect themselves from cyber-crimes by being aware of what information is being put on the Internet and being aware that the information can be seen at any time by any person in the world. There are departments of security in place for the mo re serious cyber-crimes and reports can be make to these departments of any cyber-attacks. Advances are constantly being made to police the Internet and cyberspace.ReferencesGoutam, R. K. (2015). Importance of Cyber Security. International Journal of Computer Applications, 111(7) doi10.5120/19550-1250Williams, B. K. Sawyer, S. C. (2015) Using Information Technology. in the raw York, New York McGraw-Hill Education

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.