You will be the required technical report; a ten-page single-spaced report covering some current aspects in the field of computer science. You will have to select and submit a topic of your choice for approval, find references for your report, create an outline for the report and submit multiple drafts of the report for feedback.
Topic- Cybercrimes
OUTLINE
CYBERCRIME
I. Abstract
The key issue facing todays society is the increase in cybercrime. This paper covers the definitions of cybercrimes growing list of cybercrimes, types, and intrusions of e-crime. It has also focused on the law against those e-crimes. Also, we will give detail information regarding cybercrime and the ways to prevent. We will also discuss about cyber security which plays an important role in the field of information technology. This paper also explains how social media plays a huge role in cyber security and will contribute a lot to personal cyber threats.
II. Keywords: Cyber-crime, Cyber security, Hacking, child pornography, phishing scams, Malware, Website spoofing, IOT Hacking, Distributed DOS attack, Webserver, Mobile Networks, Encryption of the code.
III. Introduction
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someones reputation, physical harm, or even mental harm. Cybercrime causes loss of billions of USD every year.
best way to project yourself against cybercrime.
IV. Major steps one should take to prevent Cyber crime
Keep software and operating system updated
Use anti-virus software and keep it updated
Use strong passwords
Never open attachment in spam emails
Do not click on links in spam emails or untrusted websites
Do not give out personal information unless secure
Keep an eye on bank statements
V. Cyber Security:
Cyber security is a potential activity by which information and other communication systems are protected from and/or defended against the unauthorized use or modification or exploitation or even theft. The first thing that comes to our mind is cyber crimes, whenever we think about the cyber security, which are increasing immensely day by day.
VI. Cyber Security Techniques
Access control and password security
Authentication of data
Malware Scanners
firewalls
Anti-virus Software
Backup and Restore Procedures
Disaster Recovery Plan
Risk Assessment Procedures
VII. Conclusion
Cybercrime is becoming harder to stop as new technologies emerge, its impacts widespread and overwhelming financially. Its important to act now to slow its progress. Through increased awareness, improved laws which target cybercrime and by utilizing biometrics which greatly enhance security, the effects of cybercrime will be mitigated.