StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Methods to Stop Different Cyber Crimes - Essay Example

Cite this document
Summary
These illegal activities include fraud, hacking, phishing, committing identity theft, and infecting computers with viruses and worm. Further, cyber crime also involves the sale of drugs through the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.8% of users find it useful
Methods to Stop Different Cyber Crimes
Read Text Preview

Extract of sample "Methods to Stop Different Cyber Crimes"

Methods to Stop Different Cyber Crimes Cyber crimes are illegal activities done by individuals over the Internet. These illegal activities include fraud, hacking, phishing, committing identity theft, and infecting computers with viruses and worm. Further, cyber crime also involves the sale of drugs through the Internet, cyber stalking and child pornography. Although many Internet users end up being victims of these illegal activities, there are ways by which these criminal activities can be stopped or prevented (Ehow, 2012).

The password used to secure one’s online accounts or information can determine whether an individual is likely to fall victim to cyber crime or not. Internet users should chose passwords with that consist of at least five characters. These passwords are not easily guessed by the criminals. Passwords that are made based on names, nicknames, telephone numbers, and other obvious words should be avoided. Passwords should consist of both uppercase and lowercase character. However, such passwords may be difficult to remember.

Internet users should aim at creating the most unique passwords that do no appear in dictionary entries (Standler, 2004).Internet users are required to activate their spam blocker whenever they use the Internet. Spam blockers enable individuals to block messages that are not needed from getting into the inbox. In addition, a spam blocker ensures that phishing emails that may be used to defraud Internet users are prevented from getting into the inbox. Most Internet providers have spam blocking features (Ehow, 2012).

Antivirus software such as McAfee, Norton, Kasperskey and Avast should be installed on computers. The installation of an antivirus alone is not an adequate measure in preventing viruses from infecting the computer; the anti virus must be updated on a regular basis. Malware, spyware and viruses can only be eliminated from the computer if the antivirus is allowed to scan the whole computer system (Ehow, 2012).Further, Internet users can stop cyber crime by using their computer’s firewall protection feature.

Firewall is a digitally created barrier that enables Internet users to prevent cyber criminals from accessing their computer systems. The Firewall should always be turned on in order to prevent the illegal activities of cyber criminals (Ehow, 2012).Also, cyber crimes can be prevented if Internet users constantly encrypt useful information as they send it to intended recipients. This can be done through the use of encryption software which ensures that personal and confidential information are not affected by criminals.

The software ensures that personal data are made unintelligible to criminals who hack into computer systems (Ghosh, 2010).Internet users are advised against providing personal information on Internet sites that ask for such details. Personal information such as name, email address, bank account and social security number should never be provided to Internet sites that demand such information. Personal information will be used to access the bank account thereby leading to financial loses (Ehow, 2012).

In some cases, cyber crimes are committed when Internet users decide to shop online. It is advisable to only perform online shopping on secure Internet sites. Secure Internet sites can be recognized by Internet users if they start with “http”. The Internet “url” that is regarded to be secure should also have a TRUST or VeriSign seal. Internet sites that lack these seals should be avoided by Internet users because they can submit credit card information to cyber criminals who actually use the data to defraud the users (Kizza, 2005).

Finally, Internet users are advised not to participate in common scams. Cyber criminals often lure Internet users into lotteries and other sweepstakes in order to get access to their personal information. Personal information is used to get access to money from the banks. These lotteries and sweepstakes often look too good to be true (Ehow, 2012).ReferencesEhow (2012), How to Prevent Cyber Crime, Retrieved on 26th June, 2012, from: http://www.ehow.com/how_4967690_prevent-cyber-crime.htmlGhosh, S (2010), Cyber Crimes: A Multidisciplinary Analysis, New York: Springer.

Kizza, J (2005), Computer Network Security, New York: Springer.Standler. R (2004), Tips for Avoiding Computer Crime, Retrieved on 26th June, 2012, from: http://www.rbs2.com/cvict.htm.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1599253-methods-to-stop-different-cyber-crimes
(Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 Words)
Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1599253-methods-to-stop-different-cyber-crimes.
“Methods to Stop Different Cyber Crimes Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1599253-methods-to-stop-different-cyber-crimes.
  • Cited: 0 times

CHECK THESE SAMPLES OF Methods to Stop Different Cyber Crimes

Sony Attacked y Cyber Criminals

cyber crimes, which are the attacks in companies or government websites, which compromises the data in those websites for personal fulfillment of hackers or profits, have been rising day by day and they have caused huge losses to organizations that have experienced them.... This group, was created for entertainment purposes and the information they get which is mainly user names and passwords of subscribers is used to threaten the company to stop the directives on tinkering of play station 3....
6 Pages (1500 words) Term Paper

How and to What Extent Can Bullying be Reduced in Schools

School is a place where children are vulnerable to bullying.... This paper provides the background to understand some of the social, cognitive, and emotional processes involved in bullying.... This paper also critically evaluates literature on strategies to reduce or prevent bullying in schools.... … According to the report the work at hand generally presents how and to what extent bullying can be reduced in schools....
6 Pages (1500 words) Essay

Computer Fraud and Abuse Act

hellip; The author of the paper explains that the Act was introduced and amended in Title 18 of the United States Code for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping.... 309) for prosecuting cyber crimes like drugs dealing, fraud, the transmission of pornography, international crime, money-laundering and the policing methodologies such as electronic eavesdropping....
4 Pages (1000 words) Essay

Criminology 1 question future crime

However, humans have realized… It is these laws that mostly prevent man from committing crimes or even thinking about committing them. The present world is slowly moving towards the twenty Future Criminology Introduction: Ever since the existence of human beings commenced, man has differentiated good from bad and bad from evil.... It is these laws that mostly prevent man from committing crimes or even thinking about committing them.... Man has proved to be capable of committing heinous crimes that are beyond the understanding of certain individuals....
2 Pages (500 words) Essay

Technology and Crime

In this paper, the writer aims to discuss crimes with respect to technology.... Additionally, the paper "Technology and Crime" describes various areas of technology-based crimes.... Several particular examples of pieces of technology and its applications are analyzed....
7 Pages (1750 words) Term Paper

Extent to Which Schools Can Reduce Bullying Among the Students

Most schools and educators through research seek for the most suitable ways to stop bullying among their students.... (2012), in order to stop bullying in the school, the management has to address the very factors causing bullying among the students in a learning institution.... Through an analysis of the previous research and secondary materials, this paper "Extent to Which Schools Can Reduce Bullying Among the Students" will address the extent to which schools can stop bullying among its students....
7 Pages (1750 words) Essay

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The essay "Computer Crime and the Measures That Can Curb the crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not.... nbsp;… This has also proved to be a major threat to security in combating the crimes that are committed on the internet.... The security experts have stepped up their game, by using preventive technology that can be used to detect internet crimes....
5 Pages (1250 words) Essay

Main Areas and Aspects of Cyber Safety

… The paper “Cyber Safety, the Ways of Cyber-crimes, Consequences of Lack of Cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... The paper “Cyber Safety, the Ways of Cyber-crimes, Consequences of Lack of Cyber-Safety, Online Protection Tools” is an informative variant of an essay on information technology.... cyber-safety is the responsible and safe utilization of the web/internet services as well as the entire communication and information technology devices, comprising digital cameras, mobile phones, and webcams....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us