Have you ever thought or imagine before your social media account been hacked? The hard work you done to gain such many followers on your social media, and allyour friend's contacts lost in one night. Imagine, t he money in your bank accountgone in the blink of your eye. This how dangerous cybercrime today .
Cybercrime happens or takes place online or primarily online. Cyber crim inalsusually target digital device such as computer and smart phone which has internetaccess. Cybercrimes includes stealing people's identities online , attacks oncorporate website , online child pornography , bullying and credit card stolen by phishing.
Accor ding to Malaysian Communications and Multimedia Commission (MCMC ),70 % commercial crime cases now can be categorized as cybercrime cases.
Don't use plagiarized sources. Get your custom essay on
InMalaysia a total of 8,313 cases of cybercrime fraud have been reported as at 3rdOctober 2018. According to statist ics by MCMC, a total of RM162 million in 2018were involved in cases of telecommunication fraud alone.
You might want to stop using the internet entirely , a fter hearing all this .
Get quality help now
Doctor Jennifer
Verified writer
Proficient in: Computer security
5 (893)
“ Thank you so much for accepting my assignment the night before it was due. I look forward to working with you moving forward ”
However,it is too drastic to do that. Instead it is good for you to learn to identified cybercrimeand ways to prevent yourself form becoming a victim of cybercrime.
As a Media Technology Student and a media user , today, I will share it to you , w ayspeople use to avoid from becoming a victim of 3 common method of cybercrime,which are hacking, phishing and cyberstalking .
(Transition: Well, let's start with hacking)BODYI. Firstly, ways to prevent yourself from becoming a victim of hacking.
Based on my computer security class that I have taken last semester, in simplehacking means illegal intrusion into a computer system without the permissionof the computer owner or user.
Get to Know The Price Estimate For Your Paper
Topic
Number of pages
EmailInvalid email
By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
"You must agree to out terms of services and privacy policy"
Avoid using publ ic networksPublic networks have a very low security level. When you are connectingto that kind of network you are exposing your device information to hackers,which can simp ly bypass it. Hence, you must refrain yourself fromconnecting to free Wi -Fi network service provided by cafes and other public areas .
For sensitive business , don't use public computer. Furthermore, never do personal transactions such as online banking orshopping which can expose your financial details on any public computersand electronic devices. Software which can record your account passwordmight be install by o ther people who have used the devices before you .
Use powerful passwordIt is very important to have a powerful password. A powerful pass wordshould be complex, and it should be combination of at least 10 numbers,symbols , and letters . You need change your password constantly and avoidusing the same password for various online sites. Remember not to giveyour password anyone even your closes friend.
Do not download unknown application online Internet nowadays have a lot free software from various site, however never download any application from unknown source because it might containmalicious applications that can infect and cause huge damage to yourelectronic device . For example, it might contain spyware which can spy onyour online activity and hack into your various online account.
(Transition: Besides, there are other type of cybercrime, such as phishing.)
Secondly, ways to prevent yourself from becoming a victim of phishingA. Phishing is a method use by cybercriminal to impersonate as a trustworthyentity in an electronic communication to attempt to acquire confidentialinformation such as credit card info, online banking username and password .
We need to
Updated with the latest phishing methodAt any time, n ew phishing scams are being developed. Without stayingupdated, you might accidentally get cheated by those scams . Be aware ofnews about new phishing technique . You will be at much lower risk of beingscam, by finding out about them as early as possible .
Anti -Phishing ToolbarNowadays, you most Internet browsers allow you to customize the browserwith anti -phishing toolbars. This kind of toolbars can make a quick scan andchecks on the web sites you visit . The toolbar will alert you, i f you cameupon a ma licious site. This service is completely free, and it act as a layerprotection for your device against phishing scams.
Never Give Out credit card and social security numberSurvey is a popular way use by online marketers to interact with theircustomer. Many companies like to send customer email s to conduct surveyregarding their company . Most of the survey form will ask the customer toprovide your personal details to verify their identity. However, you have theright to reject and decline whatever the company is offering. You may giveaway your secondary information such as work address and different emailaddress, if you want to know more about the product. Whatever the situationis, n ever reveal your credit c ard pin number and your social media password. Besides, always check the URL of the website before you enter the website .
Use Antivirus SoftwareAntivirus are designed to prevent, detect, search for, and remove softwareviruses, and other malicious software such as trojans, worms, adware, andmore. The antivirus software that been use need to be always keep up todate regularly, because n ew malicious software and scams are created allthe t ime. All file s that are from the Internet to your computer are scan byantivirus to help f irewall protection prevents access to malicious files byblocking phishing attacks. Antivirus helps to ensure no damage was done to your computer system .
(Transition : So, you guys had learned about hacking and phishing, what is next? The nextthing I going to talk about is cyberstalking)
Lastly, ways to prevent yourself from becoming a victim of cyberstalking. A. Cyber stalker use s the Internet and other electronic means to stalk or harass others .
Avoid uploading your personal info on social media accountSharing information has become much easier with the help of applicationsuch as Facebook, Twitter and Instagram. However, i s dangerous to postsensitive information about yourself such as email address, mobile number,or even your real home address. Th ese details can be use by stalkers toharass, or even worse, hack into your account. Sometimes y our personalinformation can be used to get through the security of your bank card andother financial accounts. When you register for new social media apps everytime consider using different email account to prevent yourself being stalk by others.
Searc h your own name on the Internet regularlyEven you did not post things regarding you online, you can't avoid all ofyour friends from posting information and photos of you. Do a regularsearch on the Internet, to keep your identity protected. You can prev ent falseinformation about you spread through online by cyber stalker.
You can and must contact the site or the server administrator, o nce you findfalse info about you online, to remove the content immediately.
If you are leaving a relationship, change all your security passwordConsider changing all your password, if you are moving away fromarelationship, especially if the relationship is abusive . In most incident, thevictims former partners are usually the ones who are behind cyberstalking,says Darrin Giglio, a Manhattan private investigator. Some dominantpartner still want ed to control their ex -partner although the relationship hasalready ended, and the best way to exert their power is by cyberstalking.
Seek for help from the professional if you think you have been cyberstalkedGet your computer and electronic devices checked by professional, if youthink that you have been stalk, becau se your devices may already beencompromise by others. Report to the incident to law enforcement andconsider hiring private investigator, if the identity of the stalker hasn't beenrevealed. The faster you act , the less er the chance the cyber stalker can cause permanent damage in your life.
Conclusion
In this globalization era, we cannot prevent our self from using the internet. Thuseveryone has a risk to become a victim of cybercrime.
To avoid yourself from becoming a victim of cybercrime, you have to do someprecaution step and be aware of the latest cybercrime method.
Hopefully, there will be less people becoming victim of cybercrime in the future.