• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Growth of cybercrime and how_society can deal with it

Extracts from this document...

Introduction

The Growth of Cyber Crime and How Society Can Deal With It In this essay, I will be looking at the Computer Misuse Act 1990, the effects of cybercrime, how cybercrime can be prevented and I will be discussing some real life stories that have been caused by cybercrime. ICT has developed dramatically over the last few years. Computers and the internet have now become a personal essential with almost 800 million computers in the UK. Internet facilities have also being developing over the recent years. At large the development of ICT has mainly had a positive effect on society; however, the development of ICT also has a negative side. As ICT has been developing, so has Cyber Crime. In 1990, the government enforced the Computer Misuse Act 1990. This meant that any one who: * Planted or transferred viruses onto computers systems with malicious intent (e.g. causing serious damage to software/ programs/ data...) * Carry's out unauthorised work or hacks into another ICT system in order to view or alter the information on an organisations computers * Commits various frauds using a computer Can face a hefty sentence or fine. There are three different sections to the computer misuse act, Section 1: * A person uses a computer with intent to get access to any data or programs held on the computer * The area the person intends to access is unauthorised and they are ...read more.

Middle

Thirdly, if an e-mail is received requesting bank details, they should check that their name is at the top of the e-mail, if it isn't then this usually means the e-mail isn't legit. If the e-mail asks the person to enter their details on a website of which the link is provide, check the URL to see if it matches the official website (this can be found on Google or on any documents that have been received from the organisation), and also check that there is a padlock at the bottom left hand side of the internet page. If there is one their then it means its safe. Finally, if the person still doubts the authenticity of an e-mail, they should contact the organisation the e-mails claims to have come from to see whether or not it is genuine. Over recent years, the amount of people who use social network has increased dramatically. The most popular of them all is Facebook which has an estimated 500 million user's world wide. However, not everyone who uses it is who they say they are. As a member of Facebook myself I am aware that it clearly states you must be 16 or over to become a member, however, it is clear that there is a huge number of children under the age of 16 using Facebook. This makes Facebook an ideal place for paedophiles to find their next victims. ...read more.

Conclusion

This means they have the potential to get their bank details, change their bank details, get utility bills... One woman; Victoria Sennitt, from South West London had provided a lot of personal information on her profile such as her phone number, home town, e-mail... An identity thief then got hold of these details and set up a mobile phone contract using Victoria's details. It was only when Victoria received a letter in the post about a new mobile contract; under her name and containing all her personal details that she realised what had happened. Although this is less severe case of identity theft when compared to some cases, a highly experienced identity thief could easily of got Victoria's bank details... using the information the had listed on her profile. (My identity was stolen on Facebook, 2007) Although this is an old story, the method behind retrieving the person details is still the same today. People should either stop using Facebook or hold back on the information they give on their profile. Doing this could potentially save them a lot of hassle and reduce the risk of having their identity stolen. Overall I believe cybercrime has a huge effect on society and that the punishments for committing cybercrime are not severe enough. Also, Cybercrime has a huge effect on society and there is still lots left to be done to try and reduce the level of cybercrime that goes on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Peer reviewed

    Computer Crime

    5 star(s)

    a clever disguise as a game, could access and remotely store: * Address and Contact Book * Safari and Youtube Searches * Consumer's Name and Email Parameters (including login data) * UUID, ICCID, IMSI (IMSI allowing to track although the device has been changed) * Keyboard Cache (equal to key-logging)

  2. Peer reviewed

    Risks of Having a Facebook Account. Immediately after the discussion in class regarding ...

    4 star(s)

    What really alarmed me was the disclosure of the networks I am in. In hope of removing these labels from anonymous searches, I tried tweaking my privacy settings and the settings in my networks tab only to discover that there is no way for one to hide the networks one

  1. ict as level coursework

    user interface and also problems that occurred during the testing of the user interface. Furthermore I will state how I overcame these problems and how it has improved the system. I will be discussing whether the system is reliable and fulfils the user requirements.

  2. A2 ICT CouseWork

    We will then check the output of doing this action, and check if all the data was probably received in the email, and we may also record how long it took for the email to be received by the other user, and we may repeat this test on different platforms (to test for any anomaly's).

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    You must have good quality biometric security and physical security to ensure the data is kept secure and have Emergency Policies in case of burglary, fire, espionage or other types of disasters. If some data gets out which is not meant to, the organisation must be prepared to come out

  2. The Growth of Cybercrime

    Over 1 billion people are now using social networking sites making it an easy target for hackers and thieves to get most of the personal details they need to steal a person's identity. The main social networking site used is Facebook holding over 500 million active users!

  1. Wjec alevel ict creating a website

    "Page-Enter" this means that on entering the page it will be animated to do something. The next bit of HTML code content="text/html; charset=utf-8" / was then replaced by the text "revealTrans(Duration=3.0, Transition=?. This line states the page animation for entering into the page will occur in a real time (in seconds)

  2. Before the system can be installed and used by hatch end cars it is ...

    Actual output- All rentals that were over three months were deleted. The image below shows that member ID 5 has rentals that have been returned and are over three months old. This is before the test was done. When the over three months old rentals are deleted the massage appears.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work