IndexAbstractIntroductionMeaningTypes of Cyber CrimeAvoiding CybercrimeAntivirus SoftwareFirewallAvoiding HarassmentBackupsCyber LawConclusionReferencesAbstractWe are all aware that in today's world most things, be it online education or online transactions, are performed using the Internet. This internet technology has also been used by a few people to carry out criminal activities. Criminals who commit cybercrimes exploit their knowledge to quickly gain advantage. They have used their expertise to steal, deceive and exploit people because they find it easy to earn money without having to do an honest day's work. Although various measures, including cyber law, have been put in place to prevent cyber crimes, there is no guarantee that compliance with these measures will prevent you from being a victim of cyber crimes. To discuss the notion of cyber crime, this essay analyzes its meaning, types and ways to avoid it. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay Introduction Cybercrime has evolved since 1990, when computers and networks were born. The types of attacks gradually changed from the "Morris code worm" in 1997 to the "Torjan" in 2004 to the "Ransom ware" attack in 2013. When computers and networks were born in the 1990s, hacking was done basically to get more information about the systems. Initially, these hacking attempts were dismissed as mere annoyances as they did not pose a long-term threat. However, with the ubiquitous spread of malicious software around the same time, hacking began to slow down networks and systems. As hackers became more skilled, they began to use their knowledge and skills to gain advantage by exploiting and victimizing others. Wherever the rate of return on investment is high and the risk is low, you will surely find people willing to take advantage of the situation. This is exactly what happens in cybercrime. Accessing and using sensitive information and data means reaping a rich harvest of returns. Catching such criminals is also very difficult. Therefore, this has led to an increase in cybercrime across the world. Today, criminals who commit cybercrimes are not driven by ego or competence. Instead, they want to use their knowledge to gain quick advantages. They are using their expertise to steal, deceive and exploit people because they find it easy to earn money without having to do an honest day's work. Meaning The World Wide Web seems like a vast phenomenon but surprisingly one of its qualities is bringing the world closer together making it a smaller place to live for its users. However, it has also managed to create another problem for people who spend long hours browsing the Cyber World: namely cyber crimes. When a crime is committed on the Internet it is called cybercrime. Cybercrimes have become a real threat today and are very different from old school crimes, such as robbery, snatching or theft. Unlike these crimes, cyber crimes can be committed alone and do not require the physical presence of criminals. Crimes can be committed from a remote location and criminals do not have to worry about law enforcement in the country where they are committing them. Types of Cyber Crimes People around the world use the Internet to commit a variety of crimes, some of which the public doesn't even know are possible.electronically. The most widespread crimes on the Internet are the following: Phising/Spoofing: unauthorized access to a computer without authorization and sending multiple emails; resending multiple commercial email messages with the intent to deceive recipients; or falsify header information in multiple email messages. Blackmail/Extortion: Using the Internet to threaten harm with the intent to extort money or other items of value from any person. Access to archived communications: Intentional access, without authorization, a service through which an electronic communications service is provided. Sports betting: Engaging in betting activities on any sporting event or competition on the Internet. Failure to deliver goods: Devising any system for to defraud or to obtain money or property by false or fraudulent claims or promises and by using the Internet for the purpose of carrying out the scheme. Electronic Harassment: Anonymous use of the Internet to annoy, abuse, threaten, or harass the person receiving the communication. Child pornography. : Using the Internet to transmit child pornography.Prostitution: Persuading, inducing, enticing, or coercing any individual to travel in interstate commerce to engage in prostitution.Drug Trafficking: Delivering, distributing, or dispensing a controlled substance via the Internet.Criminal Copyright Infringement: copyright infringement for profit... or by distributing a work prepared for commercial distribution over a computer network. Avoiding Computer Crime Anti-Virus Software In the 1980s, computer viruses were typically transmitted from one user to another via floppy disks. Therefore, in the 1980s users did not need antivirus software if they (1) purchased software only from reputable sources and (2) never copied programs from floppy disks provided by their friends and colleagues. Three developments in the 1990s made antivirus software essential for all computer users: It became common to distribute software and updates via Internet downloads, Hackers developed viruses that were delivered within macros for Microsoft Word, which malicious macros could be hidden within a document sent via email, and Hackers developed malicious computer programs that were commonly distributed as email attachments: clicking on the attachment ran the malicious and infected computer program the victim's computer. Since everyone uses email and almost everyone downloads executable software from the Internet, everyone should have a good antivirus program running on their computer. Because a virus, worm, or other malicious program can be transmitted via an email attachment, you must strictly follow three rules: Never open an executable attachment. Never open any attachment from an unknown source. Be careful of any attachment that has a double file extension, especially when the rightmost file extension is an executable file type. Firewall It is good practice to erect a "firewall" between parts of a computer system that an external user can access (for example, via modem, Internet, or voice mail) and parts that are supposed to be accessible only by a local user. Many hackers run programs that perform random Internet searches and probe ports on computers connected to the Internet. If the hacker finds an "open" port, he or she may be able to access that computer and view/edit/delete files on that computer. What's worse, hackers could also take control of the victim's computer and use it to launch their own illegal attacks on other computers. Avoid Harassment For casual online activities, it is., 1995.
tags