• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Growth of cybercrime and how_society can deal with it

Extracts from this document...

Introduction

The Growth of Cyber Crime and How Society Can Deal With It In this essay, I will be looking at the Computer Misuse Act 1990, the effects of cybercrime, how cybercrime can be prevented and I will be discussing some real life stories that have been caused by cybercrime. ICT has developed dramatically over the last few years. Computers and the internet have now become a personal essential with almost 800 million computers in the UK. Internet facilities have also being developing over the recent years. At large the development of ICT has mainly had a positive effect on society; however, the development of ICT also has a negative side. As ICT has been developing, so has Cyber Crime. In 1990, the government enforced the Computer Misuse Act 1990. This meant that any one who: * Planted or transferred viruses onto computers systems with malicious intent (e.g. causing serious damage to software/ programs/ data...) * Carry's out unauthorised work or hacks into another ICT system in order to view or alter the information on an organisations computers * Commits various frauds using a computer Can face a hefty sentence or fine. There are three different sections to the computer misuse act, Section 1: * A person uses a computer with intent to get access to any data or programs held on the computer * The area the person intends to access is unauthorised and they are ...read more.

Middle

Thirdly, if an e-mail is received requesting bank details, they should check that their name is at the top of the e-mail, if it isn't then this usually means the e-mail isn't legit. If the e-mail asks the person to enter their details on a website of which the link is provide, check the URL to see if it matches the official website (this can be found on Google or on any documents that have been received from the organisation), and also check that there is a padlock at the bottom left hand side of the internet page. If there is one their then it means its safe. Finally, if the person still doubts the authenticity of an e-mail, they should contact the organisation the e-mails claims to have come from to see whether or not it is genuine. Over recent years, the amount of people who use social network has increased dramatically. The most popular of them all is Facebook which has an estimated 500 million user's world wide. However, not everyone who uses it is who they say they are. As a member of Facebook myself I am aware that it clearly states you must be 16 or over to become a member, however, it is clear that there is a huge number of children under the age of 16 using Facebook. This makes Facebook an ideal place for paedophiles to find their next victims. ...read more.

Conclusion

This means they have the potential to get their bank details, change their bank details, get utility bills... One woman; Victoria Sennitt, from South West London had provided a lot of personal information on her profile such as her phone number, home town, e-mail... An identity thief then got hold of these details and set up a mobile phone contract using Victoria's details. It was only when Victoria received a letter in the post about a new mobile contract; under her name and containing all her personal details that she realised what had happened. Although this is less severe case of identity theft when compared to some cases, a highly experienced identity thief could easily of got Victoria's bank details... using the information the had listed on her profile. (My identity was stolen on Facebook, 2007) Although this is an old story, the method behind retrieving the person details is still the same today. People should either stop using Facebook or hold back on the information they give on their profile. Doing this could potentially save them a lot of hassle and reduce the risk of having their identity stolen. Overall I believe cybercrime has a huge effect on society and that the punishments for committing cybercrime are not severe enough. Also, Cybercrime has a huge effect on society and there is still lots left to be done to try and reduce the level of cybercrime that goes on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    After having used the website for quite a long time and gone through the majority of pages I found out that no other form of multimedia has been used on the entire website. Actually for a DVD selling website this is not really required however some sites such as the

  2. Marked by a teacher

    Information Age

    3 star(s)

    You Tube Music section looks just like other channel areas on YouTube, making it very difficult to find your favourite artists. YouTube has also made some minor refinements to the display that appears at the end of a video. There's one other change worth mentioning: They changed their "Play" button.

  1. Peer reviewed

    Computer Crime

    5 star(s)

    (Nicolas Seriot 2010, Ellinor Mills 2010, Nine News - 4:30, Tuesday March 09, 2010) Seriot says, "Harvested from large numbers of users, such data have a huge value in the underground market of personal data, and it must be assumed that Trojans are, in fact, exploiting this on the App Store."

  2. Peer reviewed

    Risks of Having a Facebook Account. Immediately after the discussion in class regarding ...

    4 star(s)

    What really alarmed me was the disclosure of the networks I am in. In hope of removing these labels from anonymous searches, I tried tweaking my privacy settings and the settings in my networks tab only to discover that there is no way for one to hide the networks one

  1. ict as level coursework

    In practice this wastes both the users time and the customers time. Another issue that was experienced with my system is that the stock control was not accurate. This meant that my user requirement of 'The system should be able to provide the user with accurate stock levels' was not met completely.

  2. A2 ICT CouseWork

    platforms, specifically on the most frequently used platforms by the general public when browsing on the web. As if my website where to not work on one of these platform's I could be excluding up to 40% of my customer base who could of potentially wanted to use our services

  1. The Impact of Mobile Phones on social Interaction

    when communicating with peers > Mobile phones are valued in this community as they foster and preserve a sense of community. At functional and symbolic levels, the phone allowed the youngsters to demonstrate that they were part of a social network and their status within that network.

  2. The Growth of Cybercrime

    Over 1 billion people are now using social networking sites making it an easy target for hackers and thieves to get most of the personal details they need to steal a person's identity. The main social networking site used is Facebook holding over 500 million active users!

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work