A Mistake Worth More Than Money

subject Type Homework Help
subject Pages 5
subject Words 853
subject School N/A
subject Course N/A

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Ling-Kurie 1
Oceana Ling-Kurie
Instructor Baaske
English 100
June 26, 2016
A Mistake Worth More Than Money
A simple click on an eye-catching web link or an unknown executable software could
damage the computer or steal the user’s identity in an instant. Trojan horses, worms, and tracking
cookies are a few examples of malware that influence users all over the world. Cyber-criminals
use these type of malwares to manipulate computers from individuals, companies, and agencies
from all over the world. Technology has changed so rapidly that programmers are not trained
properly which leads to the increase of cybercrime incidents. Organizations must strengthen the
standards when they hire programmers.
The number of reported information security incidents around the world rose 48% to 42.8
million, which is equivalent to 117,339 attacks each day, and detected security incidents have
increased 66% each year since 2009 (Global State of Information Security Survey 2015). Since
cybercrime influences government agencies, public industries, and the entire population, the
damage can build up to several hundred billion U.S. dollars. Many companies have lost
substantial amounts of money to cyber-attacks. Not only does cybercrime effect public’s wallets,
but also things that cannot be bought back by money their personal identity and information.
Many hackers use malware to infiltrate and manipulate the computer’s software and illegally
steal the user’s information. For instance, the 2014 massive bank hacking incident against J.P.
page-pf2
Ling-Kurie 2
Morgan Chase & Co., one of the biggest banks in America. Hackers got the contact information,
such as names, home addresses, and phone numbers, of 76 million households and 7 million
small business (O’Toole). Another similar cybercrime is account takeover, which is when the
hacker compromises a user’s computer and installs malignant software, such as key loggers,
which record keystrokes, passwords, and other private information. Once these criminals steal
the user’s password, they may be able to breach social media accounts, email accounts, and even
online bank accounts from anywhere in the world.
In order to decrease cyber-attack incidents, many organizations make posters or blogs
about different ways to prevent cybercrime from happening. The most common solution would
be spending hundreds of dollars on antivirus systems and firewalls. Yet, they are overlooked the
page-pf3
page-pf4
page-pf5

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.