The role of cybersecurity and cybercrime: [Essay Example], 1481 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

The Role of Cybersecurity and Cybercrime

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

In today’s growing word cybersecurity is very necessary because, As technology provides many facilities to use it also some effects like security threats and cyber attacks. To protect the data from hankering and the cyber attacks we will require the cybersecurity. Cybersecurity is a process to save the networks, computer programs, and data from the illegal access or users that aim to access users data for personal uses and benefits. For the protection of data, many organizations develop a software. This software help to protect the data and information.Cybersecurity playing a big role in developing a technology and other services like the internet. we only think about the ‘cybersecurity’ whenever we listen to the cyber crimes. This paper describes the cyber security, cyber attack, types of cyber attacks, and major area in cybersecurity.

Cyber combine form relating to information, the internet and virtual reality.cybersecurity is necessary since it helps in securing data from threats such as data theft or misuse, also safeguard your system from virus. The term cybersecurity is used to refer to the security offered through online services to protect your online information.with an increasing amount of people getting connected to the internet, the security threats that cause massive harm are increasing also. In India, we went straight from no telephones to the latest in mobile technology says Cherian Samuel of the Institute for Defence Studies and Analysis,(IDSA)in New Delhi and the same with internet connected computers Cybersecurity was designed to help learners develop a deeper understanding of modern information and system protection technology and methods. In information technology, data protection or information security is one of the great challenges of the world.

Cybercrime has led to the loss of billions of dollars, malfunctioning of a computer system, the destruction of critical information, the compromising of network integrity and confidentiality, etc. Cybercrime:-cyber crime, or computer oriented crime, is a crime that involves a computer and a network.cybercrime also called computer crime, is an illegal activity that involves a computer or network connected device, such as a mobile phone. The Department of justice divides cybercrime into three categories:crimes in which the computing device is the target, for example, to gain network access;crimes in which the computer is used as a weapon, for example, to launch a denial of service (DoS) attack; and crimes in which the computer is used as an accessory to a crime, for example, using a computer to store illegally-obtained data.

Major areas of cybersecurity Application security: Application security is to hold within measures that are taken in the development of the life cycle to prevent the applications from threats and attacks that come in the application design developments and maintenance. Application security ways are: a)Input parameter validation. b)User Authentication. c) Session management, parameter manipulation & exception management. d) Auditing and logging. Information security: Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to prevent this are: a) Identification, authentication & authorization of the user. b) Cryptography. Disaster recovery: Disaster recovery is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. all business should have a concrete plan for disaster recovery to resume normal business operations as soon as possible after the disaster. Network security: Network security includes the activities to protect the usability, reliability, integrity, and safety of the network. The effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components are: a) Anti-virus and anti-spyware, b)Firewall, to block unauthorized access to your network. c)Intrusion prevention systems (IPS). d) Virtual Private Networks (VPNs) for providing secure remote access.

Cyber attacks: A cyber attack is carefully exploitation of computer systems, technology dependent on the networks and enterprises. Cyber attacks use harmful code to change the computer code or data, resulting in disturbing of the importance that can arrangement data and leads to cyber crimes, like identity and information theft.Cyber Attacks are also called computer network attack (CNA). Types of attacks in cybersecurity identity theft: Identity theft is the act of a person obtaining information illegally about someone else. Thieves and hackers try to find such information as full name, maiden name, address, date of birth, social security number, passwords, phone number, email, and credit card numbers. When a thief stole your personal information then use this information for different purpose like financial fraud, such as credit card fraud, bank fraud, tax rebate fraud. They can use your information for other crimes like entering a country illegally, trafficking drugs, smuggling etc.

Prevention from identity theft. 1. When you are entering any personal information on the Internet and server, make sure that connection is secure. 2. Whenever you are purchasing anything from the internet, do not store your credit card number and personal information on that site. 3. A good antivirus is always active in your system.4. Be aware from the fake sites and services. Malware: Malware is a combination of mal and ware from the (malicious and software)Malware is a term used for a variety of threats such as Trojans, viruses, and worms. Malware is simply defined as code with malicious intent that typically steals data or destroys something from the computer. Malware is mostly entered into the system through email attachments, software downloads from the internet.

Types of malware: Virus – Infects program files and/or personal files Spyware – Software that collects personal information Worm – Malware that can replicate itself across a network Trojan horse – Malware that looks, and may even operate, as a legitimate program Browser hijacker – Software that modifies your web browser Prevention from this – one of the best ways to prevent malware is to avoid clicking on links or downloading attachments from unknown senders. Spyware – Spyware is a term used to describe the software and files that are intentionally installed on a computer which is used to monitor what other users of the same computer are doing. It is term designed forget the information secretly about the user activity. Spyware programs are used to track users’ habits to better target them with advertisements. Spyware is usually installed onto the user’s machine without them knowing when a link is followed by them which redirects the user to a malicious website. Prevention from the spyware. The system is affected with the spyware by visiting the infected website, downloading infected software etc. Download from well-known and reputable sites only. Use a firewall for enhanced security. Maintain anti-virus and anti-spyware updates. Phishing:- phishing attacks are attacks that are sent through email or pop messages and ask users to click on a link and enter their personal data. It will attract the user according to their interest and when the user clicks on the link then the hanker will able to enter the system and stole the data and personal information from the system. Denial-of-service A DoS attack focuses on disrupting the service of a network. Attackers send high volumes of data or traffic through the network until the network becomes overloaded and can no longer function and stop functioning. The common DOS attacks are DDOS (distributed-denial-of-service ) it will also send the high volume data and traffic on services until server and network stop working. There are two types of DOS attacks:- flooding services and the crashing services.

Flooding services Flood attacks occur when the system finde too much traffic for the server to buffer, causing them to slow down and ultimately stop. The most Popular flooding attacks are: Buffer overflow attacks, ICMP flood, SYN flood, crashing services, DoS attack, s simply blame that cause the target system or service to get crash. In these attacks, the input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the system so that it can’t be accessed or used. Password sniffingWhen hankers not able to guess your password then they try they another method called Password sniffing. In this, the attacker uses the software and try to access your data and information but the software is running on their own machine,they are trying to get your password and username when they get the access in it they are able to get access in your system and network. Website defacementWebsite defacement is the attacks usually done on the websites. These attack on a website that changes the visual appearance of the site or a webpage. This is basically done by hackers and destroyers, they will replace the webpage and server with their own webpage and site. There are different desires of attackers which lead to deface the website, one of them is a political motivation.the attackers who do this type of activities are called hacktivists they may change the content of the website with message picture and another text of their own choice.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

The role of cybersecurity and cybercrime. (2018, August 02). GradesFixer. Retrieved October 28, 2020, from https://gradesfixer.com/free-essay-examples/the-role-of-cybersecurity-and-cybercrime/
“The role of cybersecurity and cybercrime.” GradesFixer, 02 Aug. 2018, gradesfixer.com/free-essay-examples/the-role-of-cybersecurity-and-cybercrime/
The role of cybersecurity and cybercrime. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-role-of-cybersecurity-and-cybercrime/> [Accessed 28 Oct. 2020].
The role of cybersecurity and cybercrime [Internet]. GradesFixer. 2018 Aug 02 [cited 2020 Oct 28]. Available from: https://gradesfixer.com/free-essay-examples/the-role-of-cybersecurity-and-cybercrime/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.