Edudorm Facebook

Vulnerability to Cybercrime

Vulnerability to Cybercrime

The rates of cybercrimes in the world are on the rise, due to the use of computer systems in different places. Computers have become vulnerable to attackers, who can easily gain access to private information. In this paper, I will consequently look at two ways which an individual is vulnerable to cybercrime.

Identity Theft

Identity theft is the most common cybercrime which is currently being used by cyber criminals, to siphon money from the victim’s bank accounts (Hill & Marion, 2016).  Everybody is vulnerable to identity theft, since cyber criminals use a software which asks for personal credit card number. After getting the credit card number, cyber criminals may either siphon money from the victim’s bank account, or use the credit card to buy products online (Nykodym, Taylor, & Vilela, 2005). This is a very serious crime, as it may lead to bankruptcy. In order falling victims’ of such attacks, one needs to be careful before giving out credit card numbers online.

Cyber Stalking

Cyber stalking is a cybercrime whereby, an attacker who knows the victim, attacks the victim through the social media or through online messages (Kshetri, 2010). This is a type of cybercrime which is not serious, since the attacker might only use the social media as a means of harassing the victim. On the contrary, the victim has total control over the attacker, whereby he or she can block the victim, thus stopping the carrying out such actions. In addition, the victim may opt to report the attacker to the relevant social media website or the online messaging platform, whereby the attacker will be blocked (Nykodym, Taylor, & Vilela, 2005). This type of attack is not consequently costly, since the victim can stop the attacker after noticing such moves.

Reference

Hill, J. B, & Marion, N. E. (2016). Introduction to Cybercrimes, Laws, and Policing in the 21st Century.

Kshetri, N. (2010). The global cybercrime industry: Economic, institutional and strategic perspectives. Heidelberg: Springer.

Nykodym, N., Taylor, R., & Vilela, J. (2005). Criminal profiling and insider cyber crimeComputer Law & Security Review21(5), 408-414. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

349 Words  1 Pages
Get in Touch

If you have any questions or suggestions, please feel free to inform us and we will gladly take care of it.

Email us at support@edudorm.com Discounts

LOGIN
Busy loading action
  Working. Please Wait...