These days, most people carry various kinds of mobile devices, such as mobile phones, laptops, personal digital assistants (PDAs) and flash memory sticks (Mobile device). The reason is because these devices have become popular and convenient for daily use. Furthermore, many companies tend to produce different models of these devices. Primary strategies that people can use to prevent becoming a victim of cyber and Internet offenses include buying computer and telecommunications products and services from reputable firms; regularly patching up operating systems, software applications, and drivers like those that enable printing functions with security updates; and backing up data on storage devices not always connected to a primary computer or other IT device as well as automatically to off-site locations. Users should also interact online only with people and organizations they trust and be wary of sharing personal or confidential information. Shredding documents containing personal information, using strong non-alphanumeric passwords (that do not spell a name or word in a dictionary in any language), and not sharing passwords along with changing passwords regularly can also help to prevent cybercrimes. This report discusses the threats and security risks that internet users face in general and mobile users in particular.
Table of Contents
Background of the Study4
Aims and Objectives6
Research instrument and procedure7
Facilities and Resources12
Limitations to the Research14
Investigating the security issues
Internet security is a set of methods to ensure preservation of data and information stored in the system connected to the World Wide Web. To date, it has become a very hot topic worldwide. People who regularly visit the Internet should be aware of the problems that may arise in this case. 'Computer crime' generic crime or cybercrime, which overwhelms with illegal transactions made through Internet or that are intended to destroy and damage computers, electronic media and Internet networks.
However, the categories that define a cyber crime are even more complex and may include crimes such as fraud, the theft, blackmail, forgery and misappropriation of public funds in which computers and networks have been used. With the development of programming and the Internet, computer crimes have become more frequent and sophisticated.
Background of the Study
Firms that lose computerized data due to system user neglect or abuse, to cybercrimes committed by insider employees or external attackers, or to a natural or human-made disaster may never fully recover from their losses. Firms that do not have data saved on their information systems automatically backed up to an offsite location along with business continuity plans ready to implement on a moment's notice risk much. Losses of data, money, or other property, along with emotional and psychological harm and even physical injury or death as the indirect result of cyber offenses, are experienced every day by thousands of individuals, families, and groups of people.
Cybercrimes such as those previously listed are normally considered nonviolent property crimes, and many also qualify as financial crimes. This is especially true if the primary goal of offenders is to illegally acquire funds or control electronic banking or ...