-
Essay / Effects of Social Media on Cybercrime
Social media is a platform used to exchange information in the form of ideas, thoughts, videos, photos and much more. The following activities take place: photo sharing, blogging, social games, social networks, video sharing, business networks, virtual worlds, reviews and even online commerce. Most of the time, people only meet if they studied together, work at the same place or are neighbors. Most of the famous social media sites are Whatsapp, Snap Chat, Facebook, YouTube, Instagram, linked-in, Tumblr, among others. Users generally use gadgets such as computers, tablets, smartphones connected to the Internet. The Internet ensures that the user sends and receives information. Users are usually able to choose what they want to post. Many businesspeople have taken advantage of the popularity of social media to reach potential customers. They post everything about their work for potential buyers to get information. Most young people also maintain relationships on social networks. Additionally, most parents entrust their children to maids who give them phones to avoid disruptions. What will happen next, no one will say. Governments and politicians are not left behind either, as they can communicate with their constituents and constituents. Say no to plagiarism. Get Custom Essay on “Why Violent Video Games Should Not Be Banned”?Get Original Essay Social media has become a powerful tool and has reduced the world to a global village. A lot of information is shared and we never know the intentions of the person receiving it. People with bad motives (harming the victim's reputation or causing physical or mental harm or loss) take advantage of this and can access this information from social sites through their computers through hacking, spamming or phishing. Crimes such as child abuse and hate crimes can also be committed on social media by malicious people, this is called cybercrime. Cybercrime threatens the security and financial health of an individual or a nation. Cybercrimes include computer hacking, copyright infringement, unwarranted mass surveillance, extortion, child pornography, and child grooming. In detail, we have them as below: Hacking, as one of the cybercrimes, is the most common of all and refers to unauthorized intrusion into a computer or network. The person engaged in hacking activities is known as a hacker and is responsible for modifying the system or security features to achieve an unintended goal. Hackers use various hacking techniques. The first is the vulnerability scanner which checks computers on networks for known weaknesses. Second, password cracking allows passwords to be recovered from data stored or transmitted by computer systems. The third is packet sniffing, which captures data packets to view data and passwords in transit across networks. Fourth, spoofing attack involves websites that falsify data by imitating legitimate sites and are therefore treated as trusted sites by users or other programs. Fifth, we have a rootkit, which represents a set of applications whose goal is to hijack control of an operating system fromlegitimate operators. The sixth is the Trojan horse, which serves as a backdoor in a computer system and allows an intruder to gain access to the system at a later time. Seventh, there are viruses, and these are self-replicating programs that spread by inserting copies of themselves into other executable files. Finally, we have keyloggers designed to record every keystroke on the affected machine for later retrieval. Therefore, hacking is very dangerous because powerful and confidential information can get into the wrong people and lead to security issues, deaths and serious thefts. Another cybercrime problem is copyright infringement. This is where a particular product or business model is copied and reproduced elsewhere. The original owner of the idea is not recognized, and if the product did not have a patent, the original owner could terminate it until losing it. The theft is therefore real on social networks. Sextortion, on the other hand, is a threat that involves exposing sexual images to get someone to do something. This is downright blackmail. These threats come both from strangers met online and from formerly intimate romantic partners. This is also becoming common, as people use it, especially people who are lazy and unwilling to work hard, to extort money from victims. People also use sextortion to obtain information, which is most often classified and can be accessed by the victim. Most victims end up in prison, especially if they are blackmailed into committing a crime. Some will even end up dead, and the person of interest will be the one who blackmailed them. Child pornography is also another form of cybercrime. It is created by taking photos, videos, or sound recordings of children wearing less or no clothing or having sex. It is usually a form of child sexual abuse because it is created by taking photographs and videos of a child being sexually assaulted. Others do it by creating images of children being sexually abused on a computer, called simulated child pornography. Ultimately, child pornography is not good and it affects the victims. For example, a child may have difficulty sleeping and concentrating or doing school work. Additionally, they may become withdrawn, uncommunicative, and angry or upset. Additionally, affected individuals may live with anxiety and depression, eating disorders, post-traumatic stress, difficulty managing stress, self-harm and suicidal thoughts, sexually transmitted infections, pregnancy, feelings of shame and guilt, drug and alcohol problems, relationship problems. problems with family, friends and partners. We also have the grooming of children and young people as a form of cybercrime. Grooming is when the offender befriends and establishes a good relationship with the child or young person with the end goal of sexually abusing them. Sometimes, the person who develops this bond with a child also does so with a family member to avoid any form of suspicion about their true intentions. Others can thus trust them, especially when they are physically around the child or when they are online. Children and young people subjected to grooming may be sexually abused, exploited or trafficked. Anyone can become a groomer, regardless of age, gender or race. Grooming can take place over a short or long period, either.