Dangers Of Cybercriminals

Improved Essays
Web 2.0 is the next generation of the World Wide Web, and many of us use it on a daily basis but there is more to than meets the eye. From social sites like FaceBook, Twitter, and YouTube to “work” sites like Gmail, Ymail, and LiveMail, we use Web 2.0 in our daily lives. There are two points that make Web 2.0 stand out; first is “delivering information and applications entirely through a web browser.” Tech Ease. (n.d). Examples of this would be the use of Word Online or Google Docs. The next point that stands out is the social aspect of Web 2.0 which allows “users can easily share information with each other. Most web 2.0 websites allow you to build a network of other users for the purposes of sharing the resources you have stored online.” …show more content…
Cybercriminals us malware short for malicious software to attack our systems to steal data, obtain personal information such as credit card information, social security number, or even where you live, they can also install monitoring programs, they can even take control of your system via the internet and lock your computer out demanding that you have to pay a certain amount to unlock it, or use it to create a botnet. A botnet is a large number of computers used at once to attack a server to bring it down temporarily, and example of this would be when a botnet was used to bring down the popular pay website PayPal, many customer …show more content…
Interpol has compiled a list of ways to help educate and guide us in this ongoing fight against cybercrime. First you can make sure you have your spam filters turned on within your email, this will allow you to filter out any suspicious emails, next is browsing safely; which simply means check the web address and make sure you are familiar with the websites you are visiting. Interpol suggest “Before giving any personal or financial details, check that you are on a secure link. Look out for the ‘s’ in ‘https’, and a padlock symbol.” Interpol Online safety. (n.d.). As a last measure to protect yourself always make sure you have the current driver and OS updates, as well as a trusted virus

Related Documents

  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1380 Words
    • 6 Pages

    Task 2 Web 2.0 is a modern term used to describe the second generation of the World Wide Web; it is based on interactivity and sharing information. It allows people to communicate with each other. It has changed from HTML web pages to active web pages, such as Wiki, blogs, social networking and online applications. Web 2.0 has changed the way website functions and made it much easier to use. Their objectives are interactivity, user content and information sharing.…

    • 1380 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations. 6. What sorts of Hackers are there? White-cap programmers: hacks to test your framework unprotected against demonstrate a point Dark cap programmers: hacks your framework to for illicit purposes Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations 7.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Information Management Introduction Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure. Assessments Completed AS 1.43 - First assignment: Website.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Dear Professor Ross, You asked whether Conner Walsh could be charged with cyberstalking in connection to the text messages and Facebook posts sent from his personal accounts. The answer is probably not. In order to be found liable for cyberstalking the defendant must show repeated electronic communication that is, “directed at a specific person,” that, “serve[s] no legitimate purpose.” Leach v. Kersey, 162 So.3d 1104, 1106 (Fla. Dist. Ct.…

    • 749 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Over the past decade people all around world have began to include technology more and more in their daily lives. A major part of these innovations is the Internet. It is one of the most powerful technological innovations in history. It allows us to communicate across continents, display photos and videos to millions of people at a time, and gather information from anywhere in the world. Of course it can be recognized using common sense that there are also consequences that come with such a powerful resource.…

    • 575 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Alfredo Lopez discusses the difference between the internet and the World Wide Web in “Social Networking and the Death of the Internet”. It is important to understand how the browsers were created, and what they were intended for in order to grasp how it has changed in people’s eyes over time.…

    • 1134 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In the time since the evolution of the web, Berners-Lee has remained close to his brainchild by continuing to facilitate the Web’s growth and development. In his book, “Weaving the Web”, Berners-Lee recounts the journey that got his idea from mere thought to become a reality. Computer geniuses are sometimes referred to as computer geeks and “Weaving the Web” reads like that of a computer geek who is either incredibly humble about his contribution to society in the invention of the Web, or he is so intelligent that it is just another day in a job’s work…

    • 951 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The Prosecution of Cyberbullies Twenty percent of children ages 11-18 have been cyberbullied, and 10% of those have also been the offender of cyberbullying. Cyberbullying is a growing problem among the teens of this new, technology-driven generation. Many people have the opinion that cyberbullies should be prosecuted. Offenders of cyberbullying cause harm to the victim and are becoming more common in society.…

    • 448 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    For example, if I have some news to share, I can easily type my thoughts into a little text box. The information then gets packaged into a block of code containing my words, and is then sent off to appear on the screens of millions of people. All the human labour required to share information has now been replaced with computers and the internet. These technological components are capable of sharing information at an almost instantaneous rate, to a much larger audience than ever attainable before. With a computer in almost everyone’s pocket, it’s easy to share any kind of tidbit of information.…

    • 1290 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The internet era has created new existent spaces for human kind, changing the interactive mode of communication and providing multiple identities in social media platform. Almost all of us live part of our lives online. Social media has been one of the most growing and trending social activities. It has changed the way of communication and sharing information.…

    • 971 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    In the social connection, Facebook, Twitter, Myspace are the examples. Facebook provides a way for users to build connections and share…

    • 900 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The Internet is a place where people are engaging in social interaction (Bargh & McKenna 2000). The Internet provides its users with access to the world of social media. In recent years, the Internet has become a form of social networking. However, given the frequent use of the Internet and its different…

    • 2193 Words
    • 9 Pages
    Improved Essays

Related Topics