Computer Crime Research Paper

Improved Essays
How do we prevent computer crime

Computer crime is a common thing in todays society. It is something that should be in every persons mind as they are surfing the web and typing in personal information. The first thing that should be done to prevent computer crime is have a firewall on their computer. A firewall is essentially a barrier for your computer that keeps information from going out into the network without permission [1].

Passwords are another important concept to consider when thinking about computer crime. It is important to not use the same password for everything [2]. It is also very critical that passwords are never shared with others. Passwords are meant to be confidential and should never be shared. Passwords should not be something simple that are easily guessable. Another smart idea is to change passwords every once in a while just to be extra cautious.

Public wifi is a hacker hub. Hackers break into the database and could potentially steal data off of the computer when it connects to the wifi network. When using public wifi, it is important not to conduct important business such as financial
…show more content…
However, it would take a supercomputer billions of years to break the message of a more effective system. The news has recently been addressing the ability to break codes much more quickly than in the past because computing power and speed is continually increasing. This poses the question of why should you use an encryption? Think of Moore 's Law; the observation that, over the history of computing hardware, the number of circuits doubles approximately every two years. With this knowledge, the chip for your credit card was created, protecting your information. Advances in the ability to encrypt, decrypt, and have confidence that technology cannot easily break the codes is a never-ending

Related Documents

  • Improved Essays

    Wisdom is supreme; therefore get wisdom. Though it cost all you have, get understanding” (New International Version). Therefore, it is imperative that one is fervently aware of the intrusions that can occur online. Internet users must take preventive measures against surveillance and online hackers. Thus, each individual must take the time to set up a computer firewall, antivirus software and security settings for each personal computer, social media site and email subscription they have.…

    • 1466 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    ), because after the statement about how the companies should protect themselves the webpage article then states "Below are some key steps to protecting your computer…" ("Cyber Crime", n.d., Protections, para. 2). The words "your computer" can be for anyone who goes on this webpage, and that would be adults because they are the most common visitors that would come to this page. It is also known for parents too because it gives information on how to help the children…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    First, always make sure you always have a secure internet connection. Most times, it may say you have a good connection when you input all your card information, but as soon as you click ‘purchase’ you lose connection to the website. You then have to refresh the page to get back to where you were, and re-enter your card information. I believe this is one way hackers can get your information. Another way to prevent identity theft is by making sure the web page you’re purchasing an item from or putting your personal information on has a little lock symbol in the web search bar.…

    • 1031 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Hardware thieving defines stealing the computer hardware vandalism is when the computer equipment is being wrecked. To lower your chances of that happening you may want to put the hardware in a secure place, lock it up and protect your devices. Who are mainly at risk in this area, are organizations that house several computers, and people with mobile devices the size that makes it particularly simple to rob. Thieves usually shoot for notebooks of company executives, as they can get into confidential company information. So with that being said software or identity theft, can be connected with hardware theft.…

    • 2603 Words
    • 11 Pages
    Great Essays
  • Superior Essays

    The internet has cyber laws that were put into place for the users to stay protected. This allows internet users access, privacy, freedom of expression, and jurisdiction. Cyber Laws are important because it incorporates all the activities concerning the internet. The article The Importance of Cyber Laws, one must Know Before Using Internet by Hector says that cyber laws are significant because they ensure that crimes are not encountered. Many people are not fully informed about these laws and how they affect us every time we decide to open up our internet browsers.…

    • 1245 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    A firewall acts the role of a security guard on your computer. It is the first step to protecting your PC as it blocks unknown programs from entering the computer through the internet. There are two types of firewalls that could be installed in a computer, a software firewall, and a hardware firewall. These two safety nets serve a similar purpose of protecting the PC but in a different way. The software firewall is an application installed so as to perform its task while a hardware firewall is a device connected to the computer.…

    • 1167 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures. Ethical hacking is usually done by the computer professionals who legally break into the computer system to report the owners about the vulnerabilities found. This paper is based on the “Ethical Hacking”, which has now become an essential part of any business organizations, which needs to deal with high level of security and severe malicious…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This information can be used to steal someone’s identity. If a social media user feels the need to share this information, they must be careful of who can see it, such as restricting the info to friends only. Also users need to be careful to only add friends they really know, instead of complete strangers, and only share information that is safe for anyone to see, because nothing is temporary on the internet. Users must not share information that tells when no one will be at the users home, such as vacation dates, because it could provide enough information to a burglar to rob the home (“Fact Sheet 35”). There are many precautions people must take in order to safely use social media, but with enough common sense and education of the threats, it becomes very…

    • 1271 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    I say they shouldn’t because the only reason why the government should have the need to gain access of someone’s texts, emails, or hear phone calls is if the citizen is showing key signs of a crime. We have rights and they shouldn’t be pushed off to the side. This surveillance can lead to a very bad misconception. In closing the government shouldn’t be allowed to use electronic…

    • 545 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”. Cybersecurity is used to stop the hackers, but it does not work all the time. “Thieves using computers can rob banks and steal corporate trade secrets from the other side of the world (Flamini 157).” They can take down government and business websites within minutes (Flamini 157). Cyberwarfare is becoming huge because the technology…

    • 1115 Words
    • 5 Pages
    Improved Essays