The Pros And Cons Of Cybercrime

1974 Words4 Pages

There has been significant advancement in the field of science and technology over the past few decades. These advancements made it possible for us to accomplish the impossible work in no time. Although, these developments may offer many benefits, but it is also a disadvantage for our daily lifestyle. Furthermore, people tend to spend most of their time on the technology such as phones, computers, etc. These devices can be very handy in order to do online shopping or any other personal work; however, they do not know that doing online shopping or any other personal work can turn into a nightmare. These personal devices are not safe while we are browsing on the internet and even people are aware of it, they are not doing anything to prevent
It is an incredibly serious and growing threat, and in this attack the majority of the attackers are criminals, overseas adversaries, and terrorist. From the article, Understanding the Relationship between Human Behaviors and Susceptibility to Cyber Attack, by Aditya Prakash, “there are four distinct categories of users, gamers, professionals, software developers, and others.” This show the category of users using the computer. According to the Federal Bureau of Investigation, “Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. Our nation’s critical infrastructure, including both private and public-sector networks, are targeted by adversaries.” Identically, in these attacks victims are the companies, universities, and the citizens, in most cases. For example, citizens are targeted by fraudsters, or in other words, by the overseas adversaries and identity thieves, and children, by online predators. Accordingly, for identity thieves stealing identities is increasingly being facilitated by the internet and so for the online
It also gives brief description of cyber attack and what are the possibilities to occur in these attacks. Furthermore, it holds reasons an example how people fall into hackers’ traps and give their identities, including their personal information. From these stolen identities they make money by selling our identities. Most of the people are aware of these things, but they still fall into their traps and do not really do any thing to prevent it, even there are ways to prevent the attack which are included in this paper. In the end, this proves the point of people being careless about the cyber-attack in which they have possibilities to lose their

Open Document