SlideShare a Scribd company logo
1 of 3
You will be the required technical report; a ten-page single-
spaced report covering some current aspects in the field of
computer science. You will have to select and submit a topic of
your choice for approval, find references for your report, create
an outline for the report and submit multiple drafts of the report
for feedback.
Topic- Cybercrimes
OUTLINE
CYBERCRIME
I. Abstract
The key issue facing today’s society is the increase in
cybercrime. This paper covers the definitions of cybercrimes
growing list of cybercrimes, types, and intrusions of e-crime. It
has also focused on the law against those e-crimes. Also, we
will give detail information regarding cybercrime and the ways
to prevent. We will also discuss about cyber security which
plays an important role in the field of information technology.
This paper also explains how social media plays a huge role in
cyber security and will contribute a lot to personal cyber
threats.
II. Keywords: Cyber-crime, Cyber security, Hacking, child
pornography, phishing scams, Malware, Website spoofing, IOT
Hacking, Distributed DOS attack, Webserver, Mobile Networks,
Encryption of the code.
III. Introduction
The crime that involves and uses computer devices and Internet,
is known as cybercrime. Cybercrime can be committed against
an individual or a group; it can also be committed against
government and private organizations. It may be intended to
harm someone’s reputation, physical harm, or even mental
harm. Cybercrime causes loss of billions of USD every year.
best way to project yourself against cybercrime.
IV. Major steps one should take to prevent Cyber crime
· Keep software and operating system updated
· Use anti-virus software and keep it updated
· Use strong passwords
· Never open attachment in spam emails
· Do not click on links in spam emails or untrusted websites
· Do not give out personal information unless secure
· Keep an eye on bank statements
V. Cyber Security:
Cyber security is a potential activity by which information and
other communication systems are protected from and/or
defended against the unauthorized use or modification or
exploitation or even theft. The first thing that comes to our
mind is ‘cyber crimes’, whenever we think about the cyber
security, which are increasing immensely day by day.
VI. Cyber Security Techniques
· Access control and password security
· Authentication of data
· Malware Scanners
· firewalls
· Anti-virus Software
· Backup and Restore Procedures
· Disaster Recovery Plan
· Risk Assessment Procedures
VII. Conclusion
Cybercrime is becoming harder to stop as new technologies
emerge, its impacts widespread and overwhelming financially.
It’s important to act now to slow its progress. Through
increased awareness, improved laws which target cybercrime
and by utilizing biometrics which greatly enhance security, the
effects of cybercrime will be mitigated.

More Related Content

Similar to You will be the required technical report; a ten-page single-spaced .docx

CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
Alistair Blake
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 

Similar to You will be the required technical report; a ten-page single-spaced .docx (20)

Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
A report on cyber Crime
A report on cyber CrimeA report on cyber Crime
A report on cyber Crime
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
 

More from taishao1

a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
taishao1
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
taishao1
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
taishao1
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
taishao1
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
taishao1
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
taishao1
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
taishao1
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
taishao1
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
taishao1
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
taishao1
 

More from taishao1 (20)

9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx9.1 Give examples of applications of IPsec.9.2 What servic.docx
9.1 Give examples of applications of IPsec.9.2 What servic.docx
 
a brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docxa brief description of two roles that a forensic psychology professi.docx
a brief description of two roles that a forensic psychology professi.docx
 
A 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docxA 65-year-old obese African American male patient presents to hi.docx
A 65-year-old obese African American male patient presents to hi.docx
 
A case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docxA case study assessing risk and proposing security for some chosen o.docx
A case study assessing risk and proposing security for some chosen o.docx
 
A 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docxA 3-4-page single-spaced essay that draws on materials posted in m.docx
A 3-4-page single-spaced essay that draws on materials posted in m.docx
 
a 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docxa 350+ word summary based on Malinowski’s writings that answers the .docx
a 350+ word summary based on Malinowski’s writings that answers the .docx
 
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docxA - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
A - Historian Marybeth Hamilton characterizes the mainstreams obses.docx
 
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
918 Riders to the Sea CATHLEEN (slowly and clearly) An Id.docx
 
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx8B20M017  Teaching Note  SOBEYS—PROJECT SUNRIS.docx
8B20M017 Teaching Note SOBEYS—PROJECT SUNRIS.docx
 
875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx875 words Include citations for all unoriginal ideas, .docx
875 words Include citations for all unoriginal ideas, .docx
 
81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx81Journal of International Studies© Foundation .docx
81Journal of International Studies© Foundation .docx
 
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx82916 f_ch02.docx  45 Chapter 2 From Public Regulat.docx
82916 f_ch02.docx 45 Chapter 2 From Public Regulat.docx
 
8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx8.1 What is the difference between RFC 5321 and RFC 53228.docx
8.1 What is the difference between RFC 5321 and RFC 53228.docx
 
8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx8. On the likely aftermath and long term effects of the coronavi.docx
8. On the likely aftermath and long term effects of the coronavi.docx
 
8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx8 pagesSelect an agency of the US government and a specific pu.docx
8 pagesSelect an agency of the US government and a specific pu.docx
 
8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx8 pages Select an agency of the US government and a specific p.docx
8 pages Select an agency of the US government and a specific p.docx
 
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
8-1 Discussion Immigration LawsIt is a violation of the immigra.docx
 
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
776! CHAPTER 26 Rococo to Neoclassicism The 18th Century in E.docx
 
8 New Scientist 4 January 2020THE tropics are the most.docx
8  New Scientist  4 January 2020THE tropics are the most.docx8  New Scientist  4 January 2020THE tropics are the most.docx
8 New Scientist 4 January 2020THE tropics are the most.docx
 
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
7 HYPOTHETICALS AND YOU TESTING YOUR QUESTIONS7 MEDIA LIBRARY.docx
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

You will be the required technical report; a ten-page single-spaced .docx

  • 1. You will be the required technical report; a ten-page single- spaced report covering some current aspects in the field of computer science. You will have to select and submit a topic of your choice for approval, find references for your report, create an outline for the report and submit multiple drafts of the report for feedback. Topic- Cybercrimes OUTLINE CYBERCRIME I. Abstract The key issue facing today’s society is the increase in cybercrime. This paper covers the definitions of cybercrimes growing list of cybercrimes, types, and intrusions of e-crime. It has also focused on the law against those e-crimes. Also, we will give detail information regarding cybercrime and the ways to prevent. We will also discuss about cyber security which plays an important role in the field of information technology. This paper also explains how social media plays a huge role in cyber security and will contribute a lot to personal cyber threats. II. Keywords: Cyber-crime, Cyber security, Hacking, child pornography, phishing scams, Malware, Website spoofing, IOT Hacking, Distributed DOS attack, Webserver, Mobile Networks, Encryption of the code. III. Introduction The crime that involves and uses computer devices and Internet,
  • 2. is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cybercrime causes loss of billions of USD every year. best way to project yourself against cybercrime. IV. Major steps one should take to prevent Cyber crime · Keep software and operating system updated · Use anti-virus software and keep it updated · Use strong passwords · Never open attachment in spam emails · Do not click on links in spam emails or untrusted websites · Do not give out personal information unless secure · Keep an eye on bank statements V. Cyber Security: Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. The first thing that comes to our mind is ‘cyber crimes’, whenever we think about the cyber security, which are increasing immensely day by day. VI. Cyber Security Techniques · Access control and password security
  • 3. · Authentication of data · Malware Scanners · firewalls · Anti-virus Software · Backup and Restore Procedures · Disaster Recovery Plan · Risk Assessment Procedures VII. Conclusion Cybercrime is becoming harder to stop as new technologies emerge, its impacts widespread and overwhelming financially. It’s important to act now to slow its progress. Through increased awareness, improved laws which target cybercrime and by utilizing biometrics which greatly enhance security, the effects of cybercrime will be mitigated.