logo

Cyber Security Fraud, Scam and Identity Theft

   

Added on  2023-06-12

10 Pages2775 Words272 Views
RESEARCH REPORT
Cyber Security Fraud, Scam and Identity Theft_1
Table of Contents.
INTRODUCTION...........................................................................................................................3
MAIN BODY...................................................................................................................................3
Cybercrime ..................................................................................................................................3
Statistical Evidence of Cyber Crime ...........................................................................................6
CONCLUSION................................................................................................................................9
REFERENCES................................................................................................................................9
Cyber Security Fraud, Scam and Identity Theft_2
INTRODUCTION
Cyber Security frauds are the threats to the data and information by the hackers who try
to steal the sensitive and confidential information of the organizations and its customers. Many
organizations adopt the ways to protect and secure the data through various technologies and
software to safeguard the information (Hasham, Joshi and Mikkelsen, 2019.). People to steal the
sensitive information try to spam the mail inboxes and the communicating tools. Spam mean the
bulk messages that the hackers and advertisers send because of zero operating costs. They use it
to spread malware and other viruses which reduce the capacity of the tools to work and leak the
information.
The other way to conduct cybercrimes is online identity theft, in which people steal the personal
information, account details and signature through their email accounts or online shopping sites
where they have entered the information. Through the information, they act as that person and
steal the money and necessary documents,
This report will discuss about “ Cyber Security Fraud, Scam and Identity Theft”. It will
specify the meaning and the actions that can be taken against cyber security fraud and identity
theft. The report will represent statistical data on the frauds and scams happening in the world
and the safety measures that organization take to protect their customer' s useful and confidential
data from the hackers.
MAIN BODY
Cybercrime
The cyber crime is renowned as the computer crime in which the individual person conduct the
crime by utilizing the the computer as well as internet. The cybercrime, fraud, scam is increasing
rapidly as large numbers of the people are depend on the technology. The utilization of the new
technology increasing the opportunity of conducting crime. In order to control the internet illegal
activity it is important to determine the the theft as well as fraud. The I theft can be done when
the individual person have enough information or the data related to particular person or the
organisation (Deora and Chudasama,2021. The identification of theft is to be done even after the
death of the victim. In the online fraud the individual person done the theft of personal
information in context to commit the the fraud. In fraudster can determine the detail for
conducting the detail such as open bank accounts, detail which is link to mobile numbers, credit
as well as debit card etc. in the current situation many if the citizens are compromised with the
Cyber Security Fraud, Scam and Identity Theft_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Fraud, Scams, and Identity Theft
|10
|2857
|310

Preventive Measures Against Identity Crime and Consumer Scams
|9
|2330
|491

Identity theft: An overview of the problem
|11
|804
|54

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87

Computer Crime and Digital Forensic : Report
|15
|3299
|123

Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks
|4
|1162
|199