Page 65 - Cyber Warnings
P. 65







2 Sure Ways To Prevent Cyber Crime

Laban Moturi, Blogger and Writer. From writersbase.org writing company





The World has come close and closer with the usage of internet. With the growing of this, many
evils have been observed, touched and experienced.

Hence, there’s need for measures to curb it, but before then, it’s important to have knowledge of
the crimes that exist, the history of this, types of cyber crimes, modern society crimes and the
various categories of cyber crimes.


It is worthwhile noting from the beginning that different governments with their law enforcement
agencies have tried to tackle this mess but with less success.



Forms of cyber crimes


Hacking. This is a form of crime whereby a person’s sensitive or personal information is
accessed by use of some software and tempered with. Hacking in the United States is
considered a misconduct and punishable.


Theft. A form of crime whereby copyrights is violated and downloads is done on music, games,
movies and software. Some of the websites are under lookout by the FBI because of peer
sharing website.

The justice systems are addressing this issue of cyber crimes, and much is dome to prevent
illegal downloading.


Malicious software. An internet based programs or software that causes disruptions to the
internet network. This software helps to access the person’s sensitive data or information by
damaging the present software system.


Child lobbying and abuse. A form of cyber crime whereby in the chat rooms the minors are
captured and are used for pornography. Though the FBI has tried to lower this, it has not gained
much success.

Identity theft. Our banking services and cash transaction has improved with the use of the
internet. However, in cyber crimes the criminals have accessed people’s bank accounts, debit
cards, social security, credit card, and other sensitive information.

These criminals siphon peoples’ money out of their account and or buy goods using their credit

65 Cyber Warnings E-Magazine December 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   60   61   62   63   64   65   66   67   68   69   70