Improving cybersecurity to eradicate cybercrime

Document Type:Research Paper

Subject Area:Criminology

Document 1

This has been a big development to our nations and organization. However, technology is threatened by the negative effect of cybercrime which is gaining grounds globally. More people are losing confidence in technology because of this simple reason of cybercrime. The question is, how can one put in place security measure to curb cybercrime. Is it achievable anyway? Background Many have of late complained about issues of technology. Introduction Professor Augustine Odinma describes cybercrime as a malicious act committed over the internet with the intention of causing network malfunction of another user’s computer or phone. Cybercrime may also be any online fraudulent activity meant to scam unsuspecting internet users. We are living in a technology driven age, it has proven to be so difficult to keep personal information confidential.

Sign up to view the full document!

The reality downs that the world has become more interconnected that ever before. Data and information is available in the internet and anybody can access. It also requires clear legislation on the same issue by the legislature. Seemingly, as technology advances the cybercrimes also increases. This makes it even harder for the forensic to deal with these crimes to be grasped. Literature review The international IT Act expounds on different types of cybercrimes and explains how to go about the cybercrimes lawfully. Some of the criminals explained in the act are; Crackers who are people create and distribute viruses with an aim of causing losses, they do this crime to satisfy antisocial intents or just for fun. Identity thieves are people who use someone’s personal details and information to commit a crime without the owner’s knowledge.

Sign up to view the full document!

Cyber bullying describes any form of bullying that takes place via the internet. Data theft is another criminal offence that takes place when information is copied or taken without permission. Trojan horses are an innocent looking program that contains hidden function, therefore they perform unauthorized function. Cyberstalking is where a person’s privacy is invaded, and every move is watched. Cybercriminals therefore invade into the system with a more complicated software which the users know nothing about. This means the users of the system are not prepared to counteract it. Easy access of information with more readily with a more complex information. This is possible for instance, one may overcome a firewall with a bypass. One can use a logic bomb to log into accounts or key loggers that steal access codes.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable