Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4

The Growth of Cybercrime

Extracts from this essay...

Introduction

The Growth of cybercrime And How society can deal with it? In this essay I am going to be talking about cybercrime and as technology develops and grows, the amount of threats from cybercrime grows along with it. The average household has around 2-4 laptops or computers, this is due to the increased usage of ICT in modern society. However the increase in usage of laptops and computers come with great threats to people's personal information which could lead to very serious issues such as identity theft and fraud. I will be giving examples of real life experiences with cybercrime, what can happen if you are a victim and how you can avoid being a victim. There are many different factors that can affect the growth of cybercrime such as, how much the person knows about computers and how to safely use them, what websites are safe to enter personal details into, what websites are fake and much more. Therefore with there being so many factors, lots of training and practice is required to prevent you from becoming a victim of cybercrime. In one case of cybercrime on social networking sites, Bryan Rutberg had his Facebook account hacked and he could not take back control.

Middle

try many different words to guess a person's password possibly leading to the access of your account whether it be a social networking site or a more severe case, a bank account. The main problem people have is that they cannot remember the passwords if they are too difficult so they deliberately make their password very simple which is not always the best idea, the main way to make a password much harder to guess is by making it at least 8 characters long being constructed with letters (UPPER CASE and lower case), numbers and symbols. E.g. Aa1!Ss2", this makes it much harder to guess than qwertyui, which is very commonly used. It is estimated that over 80% of personal computers are infected with spyware and other malicious software that computers can be infected by. "A New York marketing firm that as recently as two weeks ago was preparing to be acquired now is facing bankruptcy from a computer virus infection that cost the company more than $164,000.""Hackers in Europe and China successfully broke into computers at nearly 2,500 companies and government agencies over the last 18 months in a coordinated global attack that exposed vast amounts of personal and corporate secrets to theft, according to a computer-security company that discovered the breach ...

Conclusion

These laws are extremely valuable to the prevention of cybercrime and see thousands of criminals offending the laws jailed every year. In summary to the growth of cybercrime and how society can deal with it? There are many ways in which people can be affected by cybercrime and many ways in which they can fight against cybercrime, it is a matter of learning about the factors of which you can be affected by cybercrime and using the knowledge of how you can be affected to prevent yourself from becoming a victim of what can be a potential disaster to an individual or organisation. For example if a business owner learnt all about what i have written in this essay and how his or her business could be affected by cybercrime, they could use their knowledge to teach their employees what they know so that they too could prevent themselves from being a victim of cybercrime. By doing this the knowledge could be passed on to other people making it much harder for malicious operation to affect people as more people would know about how to prevent themselves from becoming a victim of cybercrime. Word count - 1587 ?? ?? ?? ?? Jamie Basnett

The above preview is unformatted text

Found what you're looking for?

  • Start learning 29% faster today
  • Over 150,000 essays available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Over 180,000 student essays
  • Every subject and level covered
  • Thousands of essays marked by teachers

Related AS and A Level Information Systems and Communication

  1. Cunha & Ribeiro Ltd: Stock Control & Invoice Database

    Furthermore, I think that the parallel changeover will allow all of the members of the organisation to be properly trained with the new system and how to use it efficiently in the workplace by spreading the dates of training over several weeks rather than several days.

  2. Marked by a teacher

    Ecommerce Case Study

    Although e-commerce has been beneficial to a large number of people the biggest problem e-commerce has is that the buyer and seller do not know or see each other resulting in e-commerce potentially being dangerous. The most obvious thing about e-commerce is the scam side on the part of both the buyer and the seller.

  1. Installing and Upgrading Software

    make the chance of an accident occurring as low as possible. It is usually impossible to remove risks entirely. Risk assessments should cover all kinds of hazards but where employees are using computers; the health and safety regulations apply. Under the regulations user have to do following: Analyse workstations and assess and reduce risks.

  2. Marked by a teacher

    Information Age

    3 star(s)

    * It can be time consuming * Sometimes they may cheat us by saying its free and force to pay at the end. * It can be costly. * Playing more computer games can hamper in ones social life. * May suffer from health problem, such as bad eye sight and bad back by playing lots of games.

  1. The Impact of Mobile Phones on social Interaction

    This lead to one mobile phone Company summing up this new work culture perfectly with the phrase "why wait till you get to the office?"(3). This attitude is reflected in a 1998 report by Motorola (4) which showed that 41% of the people interviewed felt that the mobile phone makes them more productive at work.

  2. What is networking?

    The term network operating system, however, is generally reserved for software that enhances a basic operating system by adding networking features. For example, some popular NOS's for DOS and Windows systems include Novell Netware, Artisoft's LANtastic, Microsoft LAN Manager, and Windows NT.

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Documentation of the program will also be necessary in order to familiarise the user with the software. * The user must be able to add new customer records, edit customer records, delete customer records and search for a particular customers record.

  2. Individual in society

    Yahoo Yahoo search engine initially kept using Google to provide its users with search results on its website Yahoo.com. However, in 2004, Yahoo! Launched its own search engine based on the combined technologies of its acquisitions and providing a service that gives per-eminence to the Web search engine over the directory.

  • Over 180,000 essays
    written by students
  • Annotated by
    experienced teachers
  • Ideas and feedback to write
    your own great essays

Marked by a teacher

This essay has been marked by one of our great teachers. You can read the full teachers notes when you download the essay.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review on the essay page.

Peer reviewed

This essay has been reviewed by one of our specialist student essay reviewing squad. Read the full review under the essay preview on this page.