logo

Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks

Stephen King's inspiration from Edgar Allan Poe's stories and the use of vivid imagery in Poe's 'The Tell-Tale Heart'.

4 Pages1162 Words199 Views
   

Added on  2023-06-09

About This Document

This essay discusses the ways to reduce cybercrime, including identity theft, internet frauds, and intrusion of computer networks. It provides insights on how internet and computer users can protect themselves from cybercrimes.

Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks

Stephen King's inspiration from Edgar Allan Poe's stories and the use of vivid imagery in Poe's 'The Tell-Tale Heart'.

   Added on 2023-06-09

ShareRelated Documents
Running head: CYBERCRIME ESSAY 1
Cybercrime Essay
Student’s Name
School Name
Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks_1
CYBERCRIME ESSAY 2
Cybercrime
In the contemporary world, explosion of the internet technology has in different ways
affected how users communicate and go about their daily lives. The internet enables people and
businesses to communicate fast and convenient. However, the internet and computers are being
used negatively in a way destructive to the society. Cybercrime has become a threat to the
internet users, especially in the mobile technology. Cybercrime is a criminal activity committed
by cybercriminals using the internet and computers as tools. These activities include but not
limited to illegal file downloads and uploads such as music and videos, and sending spam emails
targeted to breach the privacy of the user (Armerding, 2015). For long now, cybercrime has
aroused the concerns of the government agencies as well as the users’ sensitivity to the
information they share through the internet (Miller & Murphy, 2009). Various methods are used
to reduce cybercrimes to the internet users especially business corporations and prominent
individuals. For that reason, this paper will focus on the pertinent parts of cybercrime which
include reducing identity theft, internet frauds and intrusion of computer networks.
How can the users of the internet and computer networks reduce identity theft? Identity
theft is identifying with another person’s information falsely mainly for financial gain. To most
internet and computer network users, the solution to this question remains bizarre. This question
has been a remedial response by the Internet Service Providers and hosts. But contrary to
expectations, to most users, the cyber crime has been hard to crack. Due to modern technology in
computing and information, identity theft has become sophisticated with hackers’ ability to hack
bank transactions, ATM vending machines, mobile phones and more. Hackers have become
interested in anything that is connecting to the internet. The problems arise because the internet
and computer users may not be aware of the forms cybercrimes take and the ways they occur.
This is regardless of numerous sensitization campaigns aiming at reducing identity theft by the
ISP, web servers, and other internet safety campaigners. To reduce cyber identity theft, the users
need to be taught the types of cybercrimes and how they can protect themselves. People should
also learn about the secure and safe sites where they can learn about cybercrimes, cases for
cybercrimes and safety measures when using the internet and computer networks. Such
informative sources include the privacy statements of most websites which includes the safety
measures of the user, exploring more on the topic of internet security using scholarly literature or
contacting the internet service providers and network administrators (Commonwealth of
Australia, 2016).
The other one is how to reduce internet fraud. The government agencies and law
enforcement for different countries work to reduce internet frauds as well as informing people on
how not to fall a victim. Internet fraud is the use of the internet to commit fraud. These include
the use of online services to fraudulently solicit, transact, and transfer proceeds of fraud to
financial institutions. These crimes are mostly committed using personal computers whiles others
use other people’s network. Agencies such as National Internal Security keep track of the
internet activities for issues like money laundering, drug trafficking, and other illegal business
activities. The agencies also provide guidelines on how to secure personal data and access to
assistance in case of theft of personal information and if used in committing internet crimes.
Some of the measures that have been put in place to protect internet users and reduce internet
Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Fraud, Scam and Identity Theft
|10
|2775
|272

Computer Crime and Digital Forensic : Report
|15
|3299
|123

Cyber Security Fraud, Scams, and Identity Theft
|10
|2857
|310

Cyber Crime and the Role of Hackers in Russia
|13
|3237
|475

Preventive Measures Against Identity Crime and Consumer Scams
|9
|2330
|491

Cybercrime: Definition, Examples, and Case Study
|8
|656
|46