We accept

Cyber Offences and Cyber Security

Jackalynn E. Sellers


Cyber related offences are increasing at an instant rate around the world. Hacking and trojans are being used to grab important personal information. Understanding cyber-crime is vital to understand how criminals are employing the web to commit various offences and what you can do to prevent these crimes from taking place. This paper covers different cyber-crimes and home elevators what the common Internet customer can do to protect themselves from slipping victim to cyber-crimes.

Keywords: Cyber Security, Cyber Crime

The Internet is a place saturated with information and over the years, information is becoming more easily accessible than ever before. Just how much information that is chosen to be shared on the Internet should be carefully considered. A straightforward post to any sociable press site could hand out more personal information than originally intended. Cyber security is important with the growing use and ease of access of the web. If an internet individual is not careful about the information given to cyberspace, the user's individuality could easily be taken or their funds drained. Cyber security is important not only to the government but also to the common user.

Cyber Crime

To understand why cyber security is necessary and important, a knowledge of cybercrime is required. Cybercrime is any illicit activity that is conducted on the web or any network-based device. These crimes include identity fraud, trojans, cyber stalking, and phishing.

Identity Theft

Identity robbery occurs whenever a hacker steals information from personal accounts such as banking information, public security figures, and addresses. The hacker will use this information to set-up accounts in the victim's name. Being conscious of encrypted websites and having enough measures of cover when imputing this information into websites is vital to even the less-than average end user of internet.


Computer viruses are bits of code that are usually attached to downloadable files. Once the file is working the code of the trojan activates and proceeds to spread throughout computer documents. These infections infect essential information and can result in deletion or problem of important system files. Some trojans will also allow private information and data to be utilized by another consumer.

Cyber Stalking

Cyber stalking is a criminal offense that occurs whenever a person is being harassed by another person in an online setting up. The victim is often bombarded with information not just to themselves, but also to family members or friends. Hazards tend to be received by the victim as a technique to get the victim to reply. Usually the victim are affected from anxiousness and fear.


Phishing is a criminal offense where e-mail is sent to the victim that mimics banking institutions or other financial or personal information accounts. The victim, if not careful, will go into their private information on a site that mimics very closely the web site used for private information. It's important for a potential sufferer to be aware of email addresses associated with lender accounts and other sites that could contain personal information.


The increase on cyber-attacks all over the world is pressing the necessity for updated cyber security. AMERICA created the Computer Crisis Response Team (CERT) in 1988 after having a wide-spread respite in of the web. The CERT does not have any power to arrest or prosecute hackers but it can provide regular security of international information on the Internet. Interpol has also setup the "I-24/7" communication system for internet-based policing to article any crimes found.

Altogether, the common user of the web can protect themselves from cyber-crimes when you are aware of what information is being put on the Internet and being aware that the information is seen anytime by anybody on the planet. You will find departments of security in place for the more serious cyber-crimes and information can be produced to these departments of any cyber-attacks. Developments are constantly being made to police the web and cyberspace.


Goutam, R. K. (2015). Importance of Cyber Security. International Journal of Computer Applications, 111(7) doi:10. 5120/19550-1250

Williams, B. K. Sawyer, S. C. (2015) Using IT. New York, NY: McGraw-Hill Education

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment