Rhetorical Analysis Of Cyber Crime

Better Essays
Rhetorical Analysis: How Do The Elements Work? What elements make a good document or webpage that could get people's attention? It is all about how effectively that piece of writing uses the rhetorical appeals - which are ethos, pathos, and logos. The Federal Bureau of Investigation's (FBI's) webpage about Cyber Crime to see how the rhetorical appeals work within different writings. The webpage comes from the FBI themselves and they wrote this webpage to tell about what is Cyber Crime and how it can affect many people. By looking closer at the webpage, it can be seen on how effective the FBI uses ethos, pathos, and logos. The first element that was observed in the Cyber Crime webpage article is ethos. Ethos is all about the author and how …show more content…
Pathos is all about the desired audience that the author chooses to write to. Having the author in the author's mind helps what type of information he/she should give and how they should write it. When reading through the webpage article it gives out a lot of information about cyber-attacks, so the audience that the author writes to is to people that want to know more about cyber-attacks and what does the FBI does about that problem. Then the author starts to go to specific people in the audience, like one sentence says, "Here are some tips for dealing with ransomware (primarily aimed at organizations and their employees…"("Cyber Crime", n.d., Ransomware, para. 10). This quote shows that right at that point of the article, he/she is looking at the people that work within a company. Then the author also looks at the other group of people too, which are just the general audience (e.g. adults, parents, teachers, etc.), because after the statement about how the companies should protect themselves the webpage article then states "Below are some key steps to protecting your computer…" ("Cyber Crime", n.d., Protections, para. 2). The words "your computer" can be for anyone who goes on this webpage, and that would be adults because they are the most common visitors that would come to this page. It is also known for parents too because it gives information on how to help the children …show more content…
Logos is all about the word choice and the way how they write, which is affected by the choice of the audience. The author starts out with telling what cyber-attacks are and what types are there, so the audience can understand what they are saying later in the article. The author writes in a friendly-serious tone because he/she wants to show how cyber-attacks are not good but not to influence the readers that the author is yelling at them. One sentence that the FBI gives is "…cyber crimes that are most dangerous to our national security and to our economy" ("Cyber Crime", n.d., para. 8). Throughout the article, the FBI author keeps that tone to show how serious he/she is, but yet in a friendly manner, the author wants to keep the audience safe. By reading this, the audience will know how serious the cyber-attacks are, and how they always need to protect their computer. Logos helps a lot on how the reader will take in the information. Ethos, pathos, and logos really do make the FBI webpage very effective on the readers. Because the author has the knowledge, knowing who he/she is talking to, and how to use their words, the readers can leave the webpage with a new aspect on how careful they should be with their computers before they could be victims of cyber-attacks. With anyone using ethos, pathos, and logos, they could have articles just effective as the FBI

Related Documents

  • Decent Essays

    WaPack Labs is located in New Boston, New Hampshire and is a cyber intelligence company that is a threat and intelligence analysis firm that services different clients around a global market. WaPack Labs provides early warning detections through data gathering, surveillance operations, and detailed analysis of a global market. The information is then shared with their clients; therefore, the clients can take appropriate actions to handle the cyber threat that are facing. The duties and responsibilities that I was given as intern was to join the hunter team. Our first responsibilities were to learn the standing operating procedures and to start downloading a few programs that the company uses.…

    • 1664 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Crime Technology

    • 1448 Words
    • 6 Pages

    The government needs to develop better methods of surveying the online activities of known criminals. In addition, they should train officers to understand the new technology. The government should have access to the best and newest technology to ensure that it is prepared for the next wave of crime. Criminals are always finding ways to adapt to the new technologies and keep their criminal activities hidden. There should also be communication between the country the product is being purchased in and the country the product is coming from.…

    • 1448 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures. Ethical hacking is usually done by the computer professionals who legally break into the computer system to report the owners about the vulnerabilities found. This paper is based on the “Ethical Hacking”, which has now become an essential part of any business organizations, which needs to deal with high level of security and severe malicious…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Forensic Analyst

    • 1169 Words
    • 5 Pages

    Mainly the analyst does the following: “Protect against criminals, strengthen the security and resilience of cyber space, securing federal networks, report data from a variety of sources to produce reports, and threat/ risk assessments” (Cyber Security Education 5). If a Cyber Analyst works for law enforcement, the focus mainly surrounds the investigation of criminal and illegal activity. Detective Gunter explains that when a device is received, it must go through a series of investigative tools to decipher the information it contains. For example, when working on a well known murder case, Detective Gunter was able to obtain text messages that linked the individual to the murder (Gunter). The law enforcement analysts also work on computer hard drives to obtain information as it relates to child abuse and stalking.…

    • 1169 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Different Types of Cybercrimes Just like there are many different types of activities you can perform on the Internet, there are different types of crimes too. Let’s have a look at the most commonly performed crimes. 1) Cyber bullying According to the National Crime Prevention Council, cyber bullying takes place “when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person.” Cyber bullying involves acts that seek to control, manipulate, falsely dishonor, or humiliate a person or entity using the computer as a mode of communication. The actions are deliberate and done repeatedly on purpose with the sole intention of causing harm. Cyber bullying is being increasingly used in schools.…

    • 1304 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Cyber terrorism could be also considered to be using the web to inform people of a Terrorist group. For example, hacking into a government control centers important files. However, people can protect themselves against the use of cyber terrorism. People’s passwords for google should be unusual, instead, check venders for for any new upgrades, or could create a unique email address and make it unknown to anyone. Using cyber terrorism is a serious crime and should be stopped.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    or reported to the police officers ,and let them handle it .to do so in order to feel safe ( Sharif.M.H and Troshani.I and Davidson,R,2015).As also big companies need to have security and safe from frauds and those who might hack their websites . and try to steal their belongings such as devolving application like milk book. this application will work behind federal firewalls. and remove very important information from their company . Allowing federal employees to feel secure about sharing it online , when they are being hacked by someone…

    • 1934 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    The first step is to get educated on ways to protect yourself against hacking, phishing, etc. Step two is to understand the common tactics hackers use and step three is to secure your computers and digital assets. You can follow these steps in order to make sure that you stay safe from the criminals lurking around the internet. I hope after reading this paper you will take some steps to try and make your computer at home the safest you can and that you will be extra careful with putting your personal information out…

    • 1245 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The internet has its advantages and therefore, the society and business organizations have strived to find ways to deal with the problem. There are both factual and legal aspects that are in place to deal with the cyber bullying (Patchin, & Hinduja, 2012). 5.1. Factual aspects Based on the effects of cyber bulling on business organizations and individuals, people have put in place social culture that helps deal with the vice these…

    • 1674 Words
    • 7 Pages
    Decent Essays