• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Growth of Cybercrime

Extracts from this document...

Introduction

The Growth of cybercrime And How society can deal with it? In this essay I am going to be talking about cybercrime and as technology develops and grows, the amount of threats from cybercrime grows along with it. The average household has around 2-4 laptops or computers, this is due to the increased usage of ICT in modern society. However the increase in usage of laptops and computers come with great threats to people's personal information which could lead to very serious issues such as identity theft and fraud. I will be giving examples of real life experiences with cybercrime, what can happen if you are a victim and how you can avoid being a victim. There are many different factors that can affect the growth of cybercrime such as, how much the person knows about computers and how to safely use them, what websites are safe to enter personal details into, what websites are fake and much more. Therefore with there being so many factors, lots of training and practice is required to prevent you from becoming a victim of cybercrime. In one case of cybercrime on social networking sites, Bryan Rutberg had his Facebook account hacked and he could not take back control. ...read more.

Middle

try many different words to guess a person's password possibly leading to the access of your account whether it be a social networking site or a more severe case, a bank account. The main problem people have is that they cannot remember the passwords if they are too difficult so they deliberately make their password very simple which is not always the best idea, the main way to make a password much harder to guess is by making it at least 8 characters long being constructed with letters (UPPER CASE and lower case), numbers and symbols. E.g. Aa1!Ss2", this makes it much harder to guess than qwertyui, which is very commonly used. It is estimated that over 80% of personal computers are infected with spyware and other malicious software that computers can be infected by. "A New York marketing firm that as recently as two weeks ago was preparing to be acquired now is facing bankruptcy from a computer virus infection that cost the company more than $164,000.""Hackers in Europe and China successfully broke into computers at nearly 2,500 companies and government agencies over the last 18 months in a coordinated global attack that exposed vast amounts of personal and corporate secrets to theft, according to a computer-security company that discovered the breach ... ...read more.

Conclusion

These laws are extremely valuable to the prevention of cybercrime and see thousands of criminals offending the laws jailed every year. In summary to the growth of cybercrime and how society can deal with it? There are many ways in which people can be affected by cybercrime and many ways in which they can fight against cybercrime, it is a matter of learning about the factors of which you can be affected by cybercrime and using the knowledge of how you can be affected to prevent yourself from becoming a victim of what can be a potential disaster to an individual or organisation. For example if a business owner learnt all about what i have written in this essay and how his or her business could be affected by cybercrime, they could use their knowledge to teach their employees what they know so that they too could prevent themselves from being a victim of cybercrime. By doing this the knowledge could be passed on to other people making it much harder for malicious operation to affect people as more people would know about how to prevent themselves from becoming a victim of cybercrime. Word count - 1587 ?? ?? ?? ?? Jamie Basnett ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Information Age

    3 star(s)

    You Tube Music section looks just like other channel areas on YouTube, making it very difficult to find your favourite artists. YouTube has also made some minor refinements to the display that appears at the end of a video. There's one other change worth mentioning: They changed their "Play" button.

  2. Marked by a teacher

    Ecommerce Case Study

    The ability to hide behind a computer screen seems to invoke the criminal side of people. The thought of the other person being hundreds of miles away on the other side of the world and never going to see them seems to encourage buyers to use fake credit cards and fraudulent information.

  1. The Impact of Mobile Phones on social Interaction

    0.4 1.0 Global 0.4 1.5 3.4 7.6 14.5 22.2 US 0.0 0.1 0.2 0.6 1.7 3.3 Japan 0.4 1.2 2.1 3.5 4.5 5.5 Global Mobile Commerce Revenues, 2000 - 2005 (USD millions) (10) It is these elements and the growth of mobile commerce combined with the personalisation of mobile phones

  2. A2 ICT CouseWork

    The Third column will have the heading of "Description" where I shall describe what I did to accomplish this, and how the test was successful. The fourth column will have the heading of "Screenshot" which will include a screenshot of how I met this point, this will act as evidence.

  1. Database Coursework on a Rental System: Design

    to uppercase End the procedure With this piece of code, the entire sting of characters entered into a field in which the code is incorporated will be automatically converted to upper case if not already entered as such by the user.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * Mr Peters currently stores all client details on paper in a cupboard in the back of the shop. This information will be entered into the new computer system. The new system will allow customer details to be entered into the computer directly without the need for a data capture form.

  1. What is networking?

    that are required to set up a network are expensive. * If one computer, cable or interface breaks the whole network may stop operating and you may not be able to use any of the computers until the fault is repaired.

  2. Individual in society

    Google Google is a popular Web search engine. Google's roots go back to 1995 when two graduate students, Sergey Brin and Larry Page, met at Stanford University. In 1996, Brin and Page collaborated on a research project that was to eventually become the Google search engine.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work