Cyber Crime Discussion
Name of Student
Name of Instructor
Institution
Date
According to Maras (2015), category I cybercrime refers to a type of crime where the computer is the main target and an accompanying network device. This happens when unauthorized individuals or groups get access to other people’s computers using either a botnet software network to automatically trace their crucial documents like financial statements. In some cases, the fraudsters trick their targets to reveal their personal details which are later used to accomplish other criminal activities with the help of disguised identity. This is definitely the main reason as to why cybercrime is classified under category I given that the computer is the main target.
Cybercrime can be avoided if necessary corrective measures are taken towards protecting computer devices from online hackers and fraudsters. To begin with, there is need for computer users to ensure that their computers have unique passwords that cannot be easily imitated. Long alphanumeric passwords are recommended given that they include a mix of special characters and both uppercase and lowercase letters to ensure safety of the legitimate owners. In such cases hackers may find it difficult to penetrate into the users’ privacy and steal their personal information.
In addition to using unique passwords, computer users can also consider installing their devices with the latest antivirus programs which are also updated regularly. One can also install specially designed firewalls to monitor and control incoming and outgoing network traffic. Both of these measure prevent unauthorized incoming and outgoing access hence preventing cyber-crime and other fraudulent online activities. Other important measures include that of ensuring that the computer’s operating system is upgraded regularly to help keep check on all activities that take place in the device and hence making it difficult for it to be invaded by attackers.
Lastly, online computer users should take the necessary steps and measures in restricting persons who can view their most sensitive information on the internet. This helps reduce chances of exposure of their documents. One of the best measures is to ensure that sensitive personal information is only shared on trusted sites and to trusted persons. It however takes personal initiative to know those suspicious sites that have been previously used for fraudulent activities so as to avoid falling victim.
References
Maras, M. H. (2015). Computer Forensics. Jones & Bartlett Publishers.
This entry was posted on February 27, 2018 at 5:34 am and is filed under Uncategorized. You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
Is this question part of your Assignment?
We can help
Our aim is to help you get A+ grades on your Coursework.
We handle assignments in a multiplicity of subject areas including Admission Essays, General Essays, Case Studies, Coursework, Dissertations, Editing, Research Papers, and Research proposals
Header Button Label: Get Started NowGet Started Header Button Label: View writing samplesView writing samples