• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Growth of cybercrime and how_society can deal with it

Extracts from this document...

Introduction

The Growth of Cyber Crime and How Society Can Deal With It In this essay, I will be looking at the Computer Misuse Act 1990, the effects of cybercrime, how cybercrime can be prevented and I will be discussing some real life stories that have been caused by cybercrime. ICT has developed dramatically over the last few years. Computers and the internet have now become a personal essential with almost 800 million computers in the UK. Internet facilities have also being developing over the recent years. At large the development of ICT has mainly had a positive effect on society; however, the development of ICT also has a negative side. As ICT has been developing, so has Cyber Crime. In 1990, the government enforced the Computer Misuse Act 1990. This meant that any one who: * Planted or transferred viruses onto computers systems with malicious intent (e.g. causing serious damage to software/ programs/ data...) * Carry's out unauthorised work or hacks into another ICT system in order to view or alter the information on an organisations computers * Commits various frauds using a computer Can face a hefty sentence or fine. There are three different sections to the computer misuse act, Section 1: * A person uses a computer with intent to get access to any data or programs held on the computer * The area the person intends to access is unauthorised and they are ...read more.

Middle

Thirdly, if an e-mail is received requesting bank details, they should check that their name is at the top of the e-mail, if it isn't then this usually means the e-mail isn't legit. If the e-mail asks the person to enter their details on a website of which the link is provide, check the URL to see if it matches the official website (this can be found on Google or on any documents that have been received from the organisation), and also check that there is a padlock at the bottom left hand side of the internet page. If there is one their then it means its safe. Finally, if the person still doubts the authenticity of an e-mail, they should contact the organisation the e-mails claims to have come from to see whether or not it is genuine. Over recent years, the amount of people who use social network has increased dramatically. The most popular of them all is Facebook which has an estimated 500 million user's world wide. However, not everyone who uses it is who they say they are. As a member of Facebook myself I am aware that it clearly states you must be 16 or over to become a member, however, it is clear that there is a huge number of children under the age of 16 using Facebook. This makes Facebook an ideal place for paedophiles to find their next victims. ...read more.

Conclusion

This means they have the potential to get their bank details, change their bank details, get utility bills... One woman; Victoria Sennitt, from South West London had provided a lot of personal information on her profile such as her phone number, home town, e-mail... An identity thief then got hold of these details and set up a mobile phone contract using Victoria's details. It was only when Victoria received a letter in the post about a new mobile contract; under her name and containing all her personal details that she realised what had happened. Although this is less severe case of identity theft when compared to some cases, a highly experienced identity thief could easily of got Victoria's bank details... using the information the had listed on her profile. (My identity was stolen on Facebook, 2007) Although this is an old story, the method behind retrieving the person details is still the same today. People should either stop using Facebook or hold back on the information they give on their profile. Doing this could potentially save them a lot of hassle and reduce the risk of having their identity stolen. Overall I believe cybercrime has a huge effect on society and that the punishments for committing cybercrime are not severe enough. Also, Cybercrime has a huge effect on society and there is still lots left to be done to try and reduce the level of cybercrime that goes on. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Underneath the cart there is more useful information written for customers, who are making a purchase through this site. The screenshot on the left shows, what is going to come up next, after the customer has chosen the Card Type and country.

  2. Marked by a teacher

    Information Age

    3 star(s)

    Question 6: What similar services are available that is not available on the Internet? Could these be more appropriate? Source Information If online entertainment service like this wasn't available in the website, we should have been depending on the DECK to watch such videos, get a cd player, hire or buy a tape film and watch it through the player.

  1. Peer reviewed

    Computer Crime

    5 star(s)

    * Keyboard Cache (equal to key-logging) * DCIM Directory (contains photos) * Photos and Videos (able to transfer) * Current Location (using weather apps and GPS parameters) * Recent Wifi Networks connected to (also parameters except password field can be accessed, also capable of being used to pinpoint phone)

  2. Peer reviewed

    Risks of Having a Facebook Account. Immediately after the discussion in class regarding ...

    4 star(s)

    What really alarmed me was the disclosure of the networks I am in. In hope of removing these labels from anonymous searches, I tried tweaking my privacy settings and the settings in my networks tab only to discover that there is no way for one to hide the networks one

  1. ict as level coursework

    When customers find out that their orders have not been delivered it will lower their satisfaction causing the company to face complaints and also destruction in their reputation. A significant problem in this system was the fact that when the user wants to add products to the 'buy products' page

  2. A2 ICT CouseWork

    then we would take a screenshot of doing so and explain how this is good. It is important we test our HTML and PHP code for any errors, as our website could be appear to be fine on some browsers; as these browser's may ignore the problem but other browser's

  1. The Impact of Mobile Phones on social Interaction

    Harper and Alex S. Taylor at Surrey University (8). The research conducted by Taylor and Harper, entitled Talking activity: young people and mobile phones (8) makes the following basic assumptions regarding the role, behaviour and effect of mobile phones on the 13-18 year age community: > Ownership of mobile phones in this age group

  2. The Growth of Cybercrime

    Over 1 billion people are now using social networking sites making it an easy target for hackers and thieves to get most of the personal details they need to steal a person's identity. The main social networking site used is Facebook holding over 500 million active users!

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work