How to Prevent CyberCrime

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  1. '

    QUESTION

     

     

    explain which are ways we can prevent or avoid being victims of a cybercrime.

     

     

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Computer Technology Pages 3 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

How to Prevent CyberCrime

Cybercrime is described as any crime that occurs online. According to Swanson, Chamelin, Territo and Taylor (2019), cybercriminals often commit crimes by targeting computer devices and networks. Cybercrime varies from security breaches to identity thieves. Other cybercrimes include cyberstalking, harassment, bullying, and child sexual exploitation. Swanson (2019) indicates that terrorists collaborate online, conducting terrorist activities and offenses into cyberspace. However, experts have developed different measures of preventing cybercrime.

According to Swanson (2019), individuals should start by securing their personal information such as last name, banking information, home address, school name, social security number, and telephone number. Individuals can achieve this by avoiding sharing personal information over email, social media sites, or instant messaging. Online users should ensure their passwords are strong. When creating a password, it is advised to use more than seven to sixteen different characters such as upper and lower case letters, punctuations, numbers, marks, and special characters such as %, $, &, and * (Swanson, 2019). Moreover, individuals should avoid sharing passwords and usernames.

Online shopping has become a common norm. Thus, when shopping online, individuals should use secure websites only.  According to Swanson (2019), a secure website will often have a symbol such as a lock which indicates that it employs software to secure the user's personal information. Individuals should be aware of phishing scams. Internet users should never connect to a link within an email. Preferably, they should ensure that a website is legitimate, open a new window and access the website by typing the address in the new window's address bar (Swanson, 2019).  Moreover, online gamers should ensure that their security software operates for that significant game.

Conclusively, to prevent cybercrime, individuals are advised to avoid sharing their personal information, confirm an online shopping web site's credibility, and use strong passwords.

References

Swanson, C. R., Chamelin, N. C., Territo, L., & Taylor, R. W. (2019). CyberCrime. In Swanson, C. R., Chamelin, N. C., Territo, L., & Taylor, R. W.  Criminal Investigation. (12th ed, pp. 507-530). McGraw Hill

 

 

 

 

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]