Pssst… we can write an original essay just for you.
Any subject. Any type of essay.
We’ll even meet a 3-hour deadline.
121 writers online
In today’s world cybercrime is a common word as it occurs so much, so Cyber security is that much necessary. In this paper I’ve tried to mention how cybercrime crime impacts us. Cyber crime can be any attempt to take valuable data, documents, bank details and using it to destroy organisations or people. Cyber security is required for dealing with this. My paper gives information about Cyber crimes, its types and measures we that we take to keep us safe from the happenings, which needs security measures we need to do, and thus in a world of cyber crime, cyber security is another flip of the coin.
Cyber security, also known as computer security is we protecting our systems from others trying to steal our information, or damaging our hardware, data or the softwares used.
It not only includes protection from the open web or the online network exchange or code injection but also keeping physical access to hardware under control.
Cyber Crime is on growth due to more and more use of Internet, wireless networks like Wi-Fi which is mostly in every thing we use today, like smartphones, laptops, computer systems, televisions and other devices.
The term cyber security can be defined as the security we get from the on-line services to make our information secured online. As the people using the internet are increasing, thus bad motives are also increasing, increasing security threats that make our systems unsecured.
Cyber is the combining form concerning to the Internet, Information technology and virtual reality.
Now to handle and analyse this huge data we need some analytic tools and these tools are known as “ Big Data Analytic Tools” .The analytic tools uses different algorithms to analyses and use data. The market research firm Gartner has categorized big data analytics tools into mainly four different types:
It all began with a research project, when Bob Thomas thought of a way of moving across networks and leaving traits whenever the went. The program CREEPER was made to travel from one Tenex terminal to another on the ARPANET and printing “I’m the Creeper: Catch me if you can.”
Then Ray Tomlinson, the one who invented e-mail, made a self-replicating computer worm called Reaper which was the first antivirus that was made that would chase and delete CREEPER.
At that time things like malware didn’t existed, like one time Russians deployed a cuber power weapon and a German computer hacker Marcus Hess hacked the gateway, hacking 400 military computers.
The Morris worm created by Robbert Morris, who wanted to calculate the size of internet. By writing a program that was supposed to go across networks, and inflater networks by a bug and copy itself, which was proved to be a mistake. It copied itself so aggressively that it slowed down the whole Internet.
After Morris worm, several deadly virus was created and in 1987, first dedicated antivirus company was released.
That was suppose This virus spread by infected floppy disks of Apple II and was designed by a 9th grade student and was placed in a gaming disk. After playing the game for fifth time, ELK CLONER poem was read out. This program was able to modify RAM also. This was one of the first virus that made such an impact. I LOVE YOU virus
In 2000, Tricking users to open the file as to others it looked to come from a known source(from email). File was VBS script having a wave junk file and it deleted loads of personal data, multimedia and other files.
One of the fastest spreading worm, it included
Sent junk mails from infected system using its subject for message. In MIMD multiple processors and computers work together.
The one who created this virus is not known.
These are professional organised groups running several activities online like selling drugs, gambling. A group of people who have a similar belief work together.
They might create malware, viruses, worms, and trying to work against an organisation, or any other sector of people, or maybe maintaining online data about their information privately.
Many of the hackers are after money, trying to get security information like username or password to access credit cards, or accessing their banks. They might also spy in others private conversation to get more information about the person they want to use.
They are generally don’t work in a group, they might make fake websites to influence others to give out sensitive data.
These kind of hackers try to give negative impact on life of their victims. They often try to give out negative information of their victims trying to trap them. It might be against a person or an organisation group.
These people try to spy on big companies or people, deleting their passwords and other security information, they give away the important details or data of them to their customers, they are called Advanced persistent threat.
Today, even desiccated organised groups for making malware can be found. They sell them, and those malware ultimately destroy the victim’s systems. These malware might get into systems through emails or through surfing.
With the increasing developments in viruses and worms, antivirus needs to be developed, as well as the user needs to be aware about it. Cyber crimes today not only affect Individuals but it may also impact the economy. People working for every sector are now a days keeping their data online, which means everything is out, so what is those important information is used by someone. We should keep our system updated and keep changing the antivirus tools as per their developments.
We should never trust any servers asking our sensitive information, as they might be used against us. With greater development, a greater flexibility is also achieved, which means more methods are developed to get the victims, as everything is online nowadays, from shopping to office works to banking to even maintaining your income records.
We provide you with original essay samples, perfect formatting and styling
To export a reference to this article please select a referencing style below:
Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.
Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec
Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you
Your essay sample has been sent.
Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.Order now
Are you interested in getting a customized paper?Check it out!