How to Avoid Being a Victim of Cybercrime

User Generated

XrivaFnintr

Business Finance

Description

You must write a 4-6 page term paper on your subject in your outline. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page.

  1. Your title page must include the title of your paper, the date, the name of the course, your name, and your instructor’s name.
  2. Your reference page must be written in APA citation style, Arial or Time New Roman styles, 12-point font.
  3. Page margins Top, Bottom, Left Side, and Right Side = 1 inch, with reasonable accommodation being made for special situations.
  4. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.

Papers will automatically run through Turnitin upon submission. Papers with an originality report of over 15% ARE NOT acceptable and will receive a grade of 0. Any source of over 2% is not acceptable.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please find attached. Thank you.

Outline

Introduction

Body

Conclusion


Running head: HOW TO AVOID BEING A VICTIM OF CYBERCRIME

How to Avoid Being a Victim of Cybercrime
Name
Professor
Institution
Course
Date

1

HOW TO AVOID BEING A VICTIM OF CYBERCRIME
How to Avoid Being a Victim of Cybercrime
Introduction
Cybercrimes are crimes that involve computers and network connectivity whereby the
computer may either be the target or the instrument used to commit the crime. Cybercrimes are
engaged with the motive to intentionally cause mental or physical harm or harm to the
reputations of the victims both directly and indirectly. For instance, the offences may involve
cyber bullying, identity theft, credit card information theft, unwarranted surveillance and
copyright infringement. Cybercrime has been very popular in the current world as technology
continues to advance at high rates and hence anyone can be a victim, both children and adults
(Burgess & Regehr, 2009). However, there are various ways that one can use to prevent
themselves from being victims of cybercrime through a combination of multiple security
protocols such as the use of firewalls and secure passwords. This paper will focus on the history
of cybercrime, its victims and how people can avoid being victims.
The history of cybercrime
Cybercrime began when hackers made efforts to break into computer networks for the
fun of accessing high-level security networks while others wanted to gain classified or sensitive
information. Finally, criminals began infecting computer systems with malware programs
(computer viruses) that result in the breakdown of computers. The use of malware programs is
still in use today on a large scale whereby they target banks or governments. In the current
world, hackers engage credit card theft and phishing scams (Keipi & Oksanen, 2013). The most
popular types of cybercrimes today are network intrusions, identity theft...


Anonymous
Awesome! Made my life easier.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags