SlideShare a Scribd company logo
1 of 7
Surname 2
Briana Castillo
Cyber Crime
6-16-15
CYBER CRIME RESEARCH
A cybercrime is any illegal behavior that is conducted by use of
electronic operations that aim to destroy security of other
computer systems and the data processed in them (Zhang, 14).
Computer is the commonly use electronic garget to commit
majority of cybercrimes. One of the cybercrimes that have been
frequently committed in the last three months using the
computer is hacking.
Hacking is a cybercrime where a person’s, organization or
government computer system is broken into with the aim of
getting private or sensitive information. In United States, cases
of computer systems being hacked are very common and this
has made hacking to be classified as a felony and an act
punishable by law (TIWARI, 16). This cybercrime is committed
by the criminals having a variety of software that help them
access other people’s computer system without being noticed.
Hacking has been a crime frequently reported with some
individuals and organization experiencing huge financial loss or
tarnishing their public name. This is because hacking makes
criminals access sensitive information such as trade secret,
source code, customer and employee information, credit card
information among other private and sensitive documents
(Zhang, 14). This crime causes theft of identity and causes
security breaches. Hacking has also been commonly used as a
competitive advantage where a criminal can break in to an
organization customer data files and later selling it to
competitors or else, using the private and proprietary
information to compete with that organizations.
A good example of hacking is an incidence that occurred in
south California in the department of revenue in 2012. Some
criminals hacked the department computer system and stole 3.6
million numbers of social security plus 387,000 credit and debit
numbers (Zhang, 24). An investigation conducted by U.S secret
service showed that the hackers had been accessing the
department computer system from august but were unnoticed
until this act was conducted.
Hacking has become more common in the last three month. In
April 2015, U.S investigators noticed that records of four
million workers were stolen and they suspected that the hacking
was sponsored by Chinese government. Another recent case on
hacking is the one of cost target companies which had caused
theft of over $300 million (TIWARI, 19). Some of the
companies that were affected by this act were Carrefour SA,
NASDAQ and visa Inc. among others. This was an act of five
hackers who were caught and prosecuted as they were charged
with the biggest cybercrime is United States. In addition,
computers have been used to hack government websites like the
tax authority resulting to high number of frauds. Banks have
also been hacked and millions of dollars stolen.
In conclusion, hacking is one of the most reported cybercrime.
In fact, 30,000 websites are hacked every day. Preventive
measures should therefore be taken to prevent this act as it can
lead financial loss, damage of public image or other effects
related to exposure of private and confidential information. In
addition, people should be educated on what to do in case
hacking occur.
Works cited
TIWARI, B K. “CYBER CRIMES AND ITS JURISDICTION.”
Indian Streams Research Journal 3.5 (2013): 1-5.
Zhang, Y et al. “A survey of cybercrimes.” Security and
Communication Networks 2012: 422-437. Print.
http://www.aicpa.org/interestareas/forensicandvaluation/resourc
es/electronicdataanalysis/downloadabledocuments/top-5-
cybercrimes.pdf
http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web-
sites-hacked-a-day-how-do-you-host-yours/
http://www.medianama.com/2012/03/223-112-government-
websites-hacked-in-last-6-months-1798-internet-fraud-cases/
Protecting the Mobile Innovation Idea
Name
Name of institution
Date
Protecting the Mobile Innovation Idea
Patenting and licensing the mobile innovation technology
developed for UNICEF is essential for protecting the system.
This will give me, as well as UNICEF, the rights to exclude
other people from using, copying, or selling the invention
without my permission, (Lee, 2012). It is an unethical conduct
to use intellectual property without prior permission or
acknowledgment from the original author, (Lee, 2012). As such,
patenting will commit the Mobile Innovation Technology to the
law and will prevent misuse or abuse of the technology by
others.
List of references
Lee, K. L. (13 September, 2012). Role of Software Patenting
and Licensing in Software
Protection. Retrieved on 4 July 2015 from:
http://www.nber.org/papers/w16323
Running Head: METHODS TO STOP CYBER CRIMINALS
1
METHODS TO STOP CYBER CRIMINALS 3
Methods to stop cyber criminals
Grantham University
Briana Castillo Valdes
The internet has provided numerous opportunities for
individuals to access information for all over across the world.
However, despite these many opportunities that the internet has
provided, cyber-crime has also come along as many people have
exploited the internet opportunities with the wrong intention of
causing harm to other internet users. Though there is a huge
problem that cyber-crime poses to advancements in technology,
there are as well many methods that can be adopted to stop
cyber criminals (Acq DeAngelis, & Sarat, 2000).
Education is one of the most effective methods to stop
cyber criminals. Knowledge is power and the kind of
information an individual has can be a tool to use against any
form of attack whether psychical or technological. Any cyber
criminals are normally very knowledgeable about the internet
and computers. They possess a wide range of information that
helps them in carrying out their criminal activities. Learning
and education on the various scams that exist on the internet
and the various ways to avoid them will help internet users in
stopping the cyber criminals as the information will keep the
users more knowledgeable than the cyber criminals.
The use of a firewall is also a method that can be used to
stop cyber criminals. A firewall is very important defense that
works by keeping out cyber criminals from accessing any
information in your computer.
The use of antivirus may help in stopping of cyber
criminals. When a computer user has installed an antivirus in
his or her computer, it protects the computer from getting
infected by viruses. In order to get the best out of the antivirus,
it is important to ensure that it is always updated.
Use of encryption to secure computers and any other
technological devices is also an effective method that can be
used to stop cyber-crimes. Encryption helps the protection of
sensitive data that has been stored in a computer. In encryption,
the selection of a password matters as the passwords that an
individual chooses to use should not be easily guessed. Making
the passwords as complex as possible plays a very key role in
securing the computer from hackers. The passwords need to be
frequently changed in order to avoid damage that may be caused
by people who may have accessed the passwords (Acq
DeAngelis, & Sarat, 2000).
Acquiring computer updates as soon as they are available is an
effective way that can stop computer criminals from attacking
your computers. In order to acquire updates, one can apply for
patches and any other software updates as soon as they are
available. Keeping the computer updated makes it difficult for
cyber criminals by blocking them from attacking your system.
Practicing safe online services will help stop cyber
criminals in a number of ways. To begin with, while surfing the
internet it is possible to find yourself in phony websites that
may entice you to supply them with personal information that
create an avenue for an attack. While engaging in online
shopping, it is also possible to visit websites that subject you to
cyber-crimes. In order to avoid attacks through online services
such as surfing and shopping it is important to be keen on what
websites you visit (Quarantiello, 1996).
References
DeAngelis, G., & Sarat, A. (2000). Cyber-crimes. Philadelphia,
PA: Chelsea House Publishers.
Quarantiello, L. E. (1996). Cyber-crime: How to protect
yourself from computer criminals. Lake Geneva, WI: Limelight
Books.

More Related Content

Similar to Surname 2Briana CastilloCyber Crime6-16-15.docx

A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentationAshokkumar Gnanasekar
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threatsHarsh Kumar
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...IJNSA Journal
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...IJNSA Journal
 

Similar to Surname 2Briana CastilloCyber Crime6-16-15.docx (17)

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber security and threats
Cyber security and threatsCyber security and threats
Cyber security and threats
 
Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...Multi level parsing based approach against phishing attacks with the help of ...
Multi level parsing based approach against phishing attacks with the help of ...
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
MULTI-LEVEL PARSING BASED APPROACH AGAINST PHISHING ATTACKS WITH THE HELP OF ...
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

More from mattinsonjanel

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxmattinsonjanel
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxmattinsonjanel
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxmattinsonjanel
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxmattinsonjanel
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxmattinsonjanel
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxmattinsonjanel
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxmattinsonjanel
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docxmattinsonjanel
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxmattinsonjanel
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxmattinsonjanel
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxmattinsonjanel
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxmattinsonjanel
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxmattinsonjanel
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxmattinsonjanel
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxmattinsonjanel
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxmattinsonjanel
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxmattinsonjanel
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxmattinsonjanel
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docxmattinsonjanel
 

More from mattinsonjanel (20)

The changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docxThe changes required in the IT project plan for Telecomm Ltd would.docx
The changes required in the IT project plan for Telecomm Ltd would.docx
 
The Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docxThe Catholic University of America Metropolitan School of .docx
The Catholic University of America Metropolitan School of .docx
 
The Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docxThe Case of Frank and Judy. During the past few years Frank an.docx
The Case of Frank and Judy. During the past few years Frank an.docx
 
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docxThe Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
The Case of MikeChapter 5 • Common Theoretical Counseling Perspe.docx
 
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docxTHE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
THE CHRONICLE OF HIGHER EDUCATIONNovember 8, 2002 -- vol. 49, .docx
 
The chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docxThe chart is a guide rather than an absolute – feel free to modify.docx
The chart is a guide rather than an absolute – feel free to modify.docx
 
The Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docxThe Challenge of Choosing FoodFor this forum, please read http.docx
The Challenge of Choosing FoodFor this forum, please read http.docx
 
The Civil Rights Movem.docx
The Civil Rights Movem.docxThe Civil Rights Movem.docx
The Civil Rights Movem.docx
 
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docxThe Churchill CentreReturn to Full GraphicsThe Churchi.docx
The Churchill CentreReturn to Full GraphicsThe Churchi.docx
 
The Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docxThe Categorical Imperative (selections taken from The Foundati.docx
The Categorical Imperative (selections taken from The Foundati.docx
 
The cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docxThe cave represents how we are trained to think, fell or act accor.docx
The cave represents how we are trained to think, fell or act accor.docx
 
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docxThe Case Superior Foods Corporation Faces a ChallengeOn his way.docx
The Case Superior Foods Corporation Faces a ChallengeOn his way.docx
 
The Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docxThe Case You can choose to discuss relativism in view of one .docx
The Case You can choose to discuss relativism in view of one .docx
 
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docxThe Case Study of Jim, Week Six The body or text (i.e., not rest.docx
The Case Study of Jim, Week Six The body or text (i.e., not rest.docx
 
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docxThe Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
The Case of Missing Boots Made in ItalyYou can lead a shipper to.docx
 
The Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docxThe Cardiovascular SystemNSCI281 Version 51University of .docx
The Cardiovascular SystemNSCI281 Version 51University of .docx
 
The Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docxThe Cardiovascular SystemNSCI281 Version 55University of .docx
The Cardiovascular SystemNSCI281 Version 55University of .docx
 
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docxThe Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
The Case of Jeff Pedophile in InstitutionJeff is a 35-year-old .docx
 
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docxThe British Airways Swipe Card Debacle case study;On Friday, Jul.docx
The British Airways Swipe Card Debacle case study;On Friday, Jul.docx
 
The Case Abstract Accuracy International (AI) is a s.docx
The Case  Abstract  Accuracy International (AI) is a s.docxThe Case  Abstract  Accuracy International (AI) is a s.docx
The Case Abstract Accuracy International (AI) is a s.docx
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Surname 2Briana CastilloCyber Crime6-16-15.docx

  • 1. Surname 2 Briana Castillo Cyber Crime 6-16-15 CYBER CRIME RESEARCH A cybercrime is any illegal behavior that is conducted by use of electronic operations that aim to destroy security of other computer systems and the data processed in them (Zhang, 14). Computer is the commonly use electronic garget to commit majority of cybercrimes. One of the cybercrimes that have been frequently committed in the last three months using the computer is hacking. Hacking is a cybercrime where a person’s, organization or government computer system is broken into with the aim of getting private or sensitive information. In United States, cases of computer systems being hacked are very common and this has made hacking to be classified as a felony and an act punishable by law (TIWARI, 16). This cybercrime is committed by the criminals having a variety of software that help them
  • 2. access other people’s computer system without being noticed. Hacking has been a crime frequently reported with some individuals and organization experiencing huge financial loss or tarnishing their public name. This is because hacking makes criminals access sensitive information such as trade secret, source code, customer and employee information, credit card information among other private and sensitive documents (Zhang, 14). This crime causes theft of identity and causes security breaches. Hacking has also been commonly used as a competitive advantage where a criminal can break in to an organization customer data files and later selling it to competitors or else, using the private and proprietary information to compete with that organizations. A good example of hacking is an incidence that occurred in south California in the department of revenue in 2012. Some criminals hacked the department computer system and stole 3.6 million numbers of social security plus 387,000 credit and debit numbers (Zhang, 24). An investigation conducted by U.S secret service showed that the hackers had been accessing the department computer system from august but were unnoticed until this act was conducted. Hacking has become more common in the last three month. In April 2015, U.S investigators noticed that records of four million workers were stolen and they suspected that the hacking was sponsored by Chinese government. Another recent case on hacking is the one of cost target companies which had caused theft of over $300 million (TIWARI, 19). Some of the companies that were affected by this act were Carrefour SA, NASDAQ and visa Inc. among others. This was an act of five hackers who were caught and prosecuted as they were charged with the biggest cybercrime is United States. In addition, computers have been used to hack government websites like the tax authority resulting to high number of frauds. Banks have also been hacked and millions of dollars stolen. In conclusion, hacking is one of the most reported cybercrime. In fact, 30,000 websites are hacked every day. Preventive
  • 3. measures should therefore be taken to prevent this act as it can lead financial loss, damage of public image or other effects related to exposure of private and confidential information. In addition, people should be educated on what to do in case hacking occur. Works cited TIWARI, B K. “CYBER CRIMES AND ITS JURISDICTION.” Indian Streams Research Journal 3.5 (2013): 1-5. Zhang, Y et al. “A survey of cybercrimes.” Security and Communication Networks 2012: 422-437. Print. http://www.aicpa.org/interestareas/forensicandvaluation/resourc es/electronicdataanalysis/downloadabledocuments/top-5- cybercrimes.pdf http://www.forbes.com/sites/jameslyne/2013/09/06/30000-web- sites-hacked-a-day-how-do-you-host-yours/ http://www.medianama.com/2012/03/223-112-government- websites-hacked-in-last-6-months-1798-internet-fraud-cases/ Protecting the Mobile Innovation Idea Name Name of institution Date
  • 4. Protecting the Mobile Innovation Idea Patenting and licensing the mobile innovation technology developed for UNICEF is essential for protecting the system. This will give me, as well as UNICEF, the rights to exclude other people from using, copying, or selling the invention without my permission, (Lee, 2012). It is an unethical conduct to use intellectual property without prior permission or acknowledgment from the original author, (Lee, 2012). As such, patenting will commit the Mobile Innovation Technology to the law and will prevent misuse or abuse of the technology by others. List of references Lee, K. L. (13 September, 2012). Role of Software Patenting and Licensing in Software Protection. Retrieved on 4 July 2015 from: http://www.nber.org/papers/w16323 Running Head: METHODS TO STOP CYBER CRIMINALS 1 METHODS TO STOP CYBER CRIMINALS 3 Methods to stop cyber criminals Grantham University Briana Castillo Valdes
  • 5. The internet has provided numerous opportunities for individuals to access information for all over across the world. However, despite these many opportunities that the internet has provided, cyber-crime has also come along as many people have exploited the internet opportunities with the wrong intention of causing harm to other internet users. Though there is a huge problem that cyber-crime poses to advancements in technology, there are as well many methods that can be adopted to stop cyber criminals (Acq DeAngelis, & Sarat, 2000). Education is one of the most effective methods to stop cyber criminals. Knowledge is power and the kind of information an individual has can be a tool to use against any form of attack whether psychical or technological. Any cyber criminals are normally very knowledgeable about the internet and computers. They possess a wide range of information that helps them in carrying out their criminal activities. Learning and education on the various scams that exist on the internet and the various ways to avoid them will help internet users in stopping the cyber criminals as the information will keep the users more knowledgeable than the cyber criminals. The use of a firewall is also a method that can be used to stop cyber criminals. A firewall is very important defense that works by keeping out cyber criminals from accessing any information in your computer. The use of antivirus may help in stopping of cyber criminals. When a computer user has installed an antivirus in his or her computer, it protects the computer from getting infected by viruses. In order to get the best out of the antivirus, it is important to ensure that it is always updated. Use of encryption to secure computers and any other
  • 6. technological devices is also an effective method that can be used to stop cyber-crimes. Encryption helps the protection of sensitive data that has been stored in a computer. In encryption, the selection of a password matters as the passwords that an individual chooses to use should not be easily guessed. Making the passwords as complex as possible plays a very key role in securing the computer from hackers. The passwords need to be frequently changed in order to avoid damage that may be caused by people who may have accessed the passwords (Acq DeAngelis, & Sarat, 2000). Acquiring computer updates as soon as they are available is an effective way that can stop computer criminals from attacking your computers. In order to acquire updates, one can apply for patches and any other software updates as soon as they are available. Keeping the computer updated makes it difficult for cyber criminals by blocking them from attacking your system. Practicing safe online services will help stop cyber criminals in a number of ways. To begin with, while surfing the internet it is possible to find yourself in phony websites that may entice you to supply them with personal information that create an avenue for an attack. While engaging in online shopping, it is also possible to visit websites that subject you to cyber-crimes. In order to avoid attacks through online services such as surfing and shopping it is important to be keen on what websites you visit (Quarantiello, 1996). References DeAngelis, G., & Sarat, A. (2000). Cyber-crimes. Philadelphia, PA: Chelsea House Publishers. Quarantiello, L. E. (1996). Cyber-crime: How to protect yourself from computer criminals. Lake Geneva, WI: Limelight