• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Growth of cybercrime and how_society can deal with it

Extracts from this document...

Introduction

The Growth of Cyber Crime and How Society Can Deal With It In this essay, I will be looking at the Computer Misuse Act 1990, the effects of cybercrime, how cybercrime can be prevented and I will be discussing some real life stories that have been caused by cybercrime. ICT has developed dramatically over the last few years. Computers and the internet have now become a personal essential with almost 800 million computers in the UK. Internet facilities have also being developing over the recent years. At large the development of ICT has mainly had a positive effect on society; however, the development of ICT also has a negative side. As ICT has been developing, so has Cyber Crime. In 1990, the government enforced the Computer Misuse Act 1990. This meant that any one who: * Planted or transferred viruses onto computers systems with malicious intent (e.g. causing serious damage to software/ programs/ data...) * Carry's out unauthorised work or hacks into another ICT system in order to view or alter the information on an organisations computers * Commits various frauds using a computer Can face a hefty sentence or fine. There are three different sections to the computer misuse act, Section 1: * A person uses a computer with intent to get access to any data or programs held on the computer * The area the person intends to access is unauthorised and they are ...read more.

Middle

Thirdly, if an e-mail is received requesting bank details, they should check that their name is at the top of the e-mail, if it isn't then this usually means the e-mail isn't legit. If the e-mail asks the person to enter their details on a website of which the link is provide, check the URL to see if it matches the official website (this can be found on Google or on any documents that have been received from the organisation), and also check that there is a padlock at the bottom left hand side of the internet page. If there is one their then it means its safe. Finally, if the person still doubts the authenticity of an e-mail, they should contact the organisation the e-mails claims to have come from to see whether or not it is genuine. Over recent years, the amount of people who use social network has increased dramatically. The most popular of them all is Facebook which has an estimated 500 million user's world wide. However, not everyone who uses it is who they say they are. As a member of Facebook myself I am aware that it clearly states you must be 16 or over to become a member, however, it is clear that there is a huge number of children under the age of 16 using Facebook. This makes Facebook an ideal place for paedophiles to find their next victims. ...read more.

Conclusion

This means they have the potential to get their bank details, change their bank details, get utility bills... One woman; Victoria Sennitt, from South West London had provided a lot of personal information on her profile such as her phone number, home town, e-mail... An identity thief then got hold of these details and set up a mobile phone contract using Victoria's details. It was only when Victoria received a letter in the post about a new mobile contract; under her name and containing all her personal details that she realised what had happened. Although this is less severe case of identity theft when compared to some cases, a highly experienced identity thief could easily of got Victoria's bank details... using the information the had listed on her profile. (My identity was stolen on Facebook, 2007) Although this is an old story, the method behind retrieving the person details is still the same today. People should either stop using Facebook or hold back on the information they give on their profile. Doing this could potentially save them a lot of hassle and reduce the risk of having their identity stolen. Overall I believe cybercrime has a huge effect on society and that the punishments for committing cybercrime are not severe enough. Also, Cybercrime has a huge effect on society and there is still lots left to be done to try and reduce the level of cybercrime that goes on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Therefore if the website starts selling Bollywood movies as well, they could get a lot more customers and from different backgrounds as well. Effectiveness of Multimedia Features The only multimedia feature I have noticed on the whole website is the use of images.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    The advantages of this method are the deals are in the main body of the homepage which is the page that must retain the customer and make them want to stay and price is a large factor in a buying decision and by offering lower prices they can attract many

  1. Marked by a teacher

    Information Age

    3 star(s)

    The drop and drag questions should be replaced because they are much easier and is un beneficial to the students. Also giving the answers before working out the actual questions is not reliable, as the students tend to cheat which might harm them in their exams.

  2. Peer reviewed

    Computer Crime

    5 star(s)

    (Nicolas Seriot 2010, Ellinor Mills 2010, Nine News - 4:30, Tuesday March 09, 2010) Seriot says, "Harvested from large numbers of users, such data have a huge value in the underground market of personal data, and it must be assumed that Trojans are, in fact, exploiting this on the App Store."

  1. The Impact of Mobile Phones on social Interaction

    > State-of-the-art handsets > Personalisation of content Region 2000 2001 2002 2003 2004 2005 North America 0.0 0.1 0.2 0.7 1.8 3.5 Western Europe 0.0 0.1 0.5 1.7 4.6 7.8 Asia 0.4 1.3 2.6 5.0 7.4 9.4 Latin America 0.0 0.0 0.0 0.1 0.2 0.5 Other 0.0 0.0 0.1 0.2

  2. A2 ICT CouseWork

    audience it must firstly be tested as it has to work on all platforms to reach a larger audience. When platform testing my website, I will use multiple testing methods, to make sure my website works probably on all platforms, as platform testing means testing "what device are audience uses

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    With the new arrival of internet TVs, it will be put to use for programming widgets. Java is used on a lot of websites and the website wouldn't work without Java. This means certain well-known tablets wouldn't work with Java embedded websites.

  2. The Growth of Cybercrime

    Over 1 billion people are now using social networking sites making it an easy target for hackers and thieves to get most of the personal details they need to steal a person's identity. The main social networking site used is Facebook holding over 500 million active users!

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work