You will be the required technical report; a ten-page single-spaced report covering some current aspects in the field of computer science. You will have to select and submit a topic of your choice for approval, find references for your report, create an outline for the report and submit multiple drafts of the report for feedback.
Topic- Cybercrimes
OUTLINE
CYBERCRIME
I. Abstract
The key issue facing today’s society is the increase in cybercrime. This paper covers the definitions of cybercrimes growing list of cybercrimes, types, and intrusions of e-crime. It has also focused on the law against those e-crimes. Also, we will give detail information regarding cybercrime and the ways to prevent. We will also discuss about cyber security which plays an important role in the field of information technology. This paper also explains how social media plays a huge role in cyber security and will contribute a lot to personal cyber threats.
II. Keywords: Cyber-crime, Cyber security, Hacking, child pornography, phishing scams, Malware, Website spoofing, IOT Hacking, Distributed DOS attack, Webserver, Mobile Networks, Encryption of the code.
III. Introduction
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cybercrime causes loss of billions of USD every year.
best way to project yourself against cybercrime.
IV. Major steps one should take to prevent Cyber crime
· Keep software and operating system updated
· Use anti-virus software and keep it updated
· Use strong passwords
· Never open attachment in spam emails
· Do not click on links in spam emails or untrusted websites
· Do not give out personal information unless secure
· Keep an eye on bank statements
V. Cyber Security:
Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. The first thing that comes to our mind is ‘cyber crimes’, whenever we think about the cyber security, which are increasing immensely day by day.
VI. Cyber Security Techniques
· Access control and password security
· Authentication of data
· Malware Scanners
· firewalls
· Anti-virus Software
· Backup and Restore Procedures
· Disaster Recovery Plan
· Risk Assessment Procedures
VII. Conclusion
Cybercrime is becoming harder to stop as new technologies emerge, its impacts widespread and overwhelming financially. It’s important to act now to slow its progress. Through increased awareness, improved laws which target cybercrime and by utilizing biometrics which greatly enhance security, the effects of cybercrime will be mitigated.