Sunday, September 22, 2019

Management info Systems individual Work WK4 Essay

Management info Systems individual Work WK4 - Essay Example The major challenge in keeping cyber-crime in check is the rate at which technology is advancing with each passing day. New cyber threats are formulated on a regular basis making it difficult to suppress cyber-crime. Crimes vary depending on the purpose of the cyber-criminal. The crimes can be directed to computers and other machines to manipulate, destroy or reconfigure them. The crimes can also be fuelled by financial greed whereby fraud comes in play and the hacking of financial institutions. The crimes can also target individuals with the aim of destroying their reputation or even blackmailing them. Cyber criminals can use various technology tools. Such tools include the internet, social media and wireless networks. Such tools are meant to help the general public in their day to day activities but can be manipulated by cyber criminals for their benefit. The cyber criminals are good at what they do and sometimes leave no traces at all making it difficult to know their real identities. Some even form organizations and advertize their prowess to willing buyers of their services. They even use these technology tools to leak information about someone. The internet as we know it is a basic tool for many computer users. Many transactions, monetary or otherwise, go through the internet each day. Millions of downloads also take place on the internet on a daily basis. This technology tool connects people around the world, turning it into a small virtual village. The internet connects people through emails and communication of information through search engines such as Google among others. This vital tool can be used against its users to commit cybercrime. This usually happens where attackers use the internet to connect to their targets and can thus get or download the necessary information they need from the victims’ computers. The internet connects computers, and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.