Explanatory Speech: Cyber Crime

Check out more papers on Communication Computer Security Crime

Introduction (Approximately 1min.)

Attention Getter: Have you or someone you know gotten a call from IRS asking for money? They may start to threaten you that you will go to jail. If so, it is very likely that it is scammer.

Background and Audience Relevance: According to The Treasury Inspector General for Tax Administration (TIGTA) report in March 6, 2018, there have been over 12,716 victims that fell for IRS phone scams and paid more than $63 million since October 2013. These people are unaware that IRS officials do not call their client for confidential information through a phone call. They will always mail to taxpayer and they will never threaten to arrest the taxpayer for not paying taxes. This is just one example of cybercrime. With more advanced technology, this will result the online community to be more dangerous. Since technology is becoming an important part of us, it is crucial that we know how to protect ourselves from cybercrime.

Speaker Credibility: As a Cyber Security Engineering major, I am here to inform you about the most common cyber-crimes that is happening around us and how common it is to be the victim of cyber-attacks.

Thesis: In this speech, you will learn about three common types of cybercrimes, which are phishing, hacking and identity theft.

Preview of Main Points: First, I will talk about phishing and different types of phishing attacks. Second, I will discuss about hacking and how someone can become a victim. Finally, I will talk about identity theft and how it impacts an individual and other online company.
Transition to first main point: To get started, I am going to talk about what phishing is and different types of phishing attacks.

Body (Approximately 3 ?-5 ? mins.)

A. Main Point 1: Phishing is a fraudulent way of getting confidential information from the user through email. These emails are written so eloquently that it can trick anyone if you don't look carefully.

1. Sub point 1: There are multiple kinds of attacks caused by phishing. Some includes Deceptive attacks, Malware attacks and DNS-based attacks. Deceptive attacks are when the users are asked to give out their personal information in the scam messages. Malware attacks is when malware is downloaded after opening the email. DNS-based attack is when users look up websites, but it will redirect to an unsafe website. Based on the book, Phishing and Counter-Measures, published in 2006 by Markus Jakobsson and Seven Myers, the author stated that most scammers send the call to action email and tell the user that there is something wrong with their information and ask them to click on the fraudulent website to correct their information.

2. Sub point 2: In December 2015, the Intel created a quiz to see if the users can distinguish the phishing emails with safe emails. Out of 19,458, majority of them of choose at one of the phishing emails and only 3% of them got all correct. This suggest that it is very difficult to find the difference between spam email and original company email. scammers will use phishing emails to have user click on it to get to access to the computer.

3. Sub point 2: Transition (summary, signpost, preview): Now that you learned about the different types of phishing. I will now move onto my next points, which will cover different types of cybercrime which is hacking.

Main Point 2: Hacking is when someone goes into another person's computer without the permission of the owner and get in the server by damaging the weakest point of the operating system. This can result the leak of confidential information.

1. Sub point 1: The three types of hackers are white hat hacker, grey hat hacker and black hat hacker. White hat hackers are cyber security specialists, who work on advancing their security system to make cyberspace a safe place for users. Grey hats hackers are also cyber security experts, but they may sometimes, go against the laws or try unethical approach to improve the protection of user. Black hats are hackers who practice unethical way to get into server by attacking and damaging the server for their personal gain.

2. Sub point 2 According to Professor Fonash, a Cyber Security Professor in George Mason University and worked with National Security Association stated in September 21, 2018 that one of the big issues with regulation with hacking is that each country has their own laws and regulations for cybercrime. In some cases, nations like third world countries do not have any strict laws. So, one way to deal with cybercrime is by having consistent laws internationally. He also suggested that to be in safe in internet, one should be careful and not provide lots information about their personal life in social media. Another best way to secure yourself in internet is by having unique password of your confidential information. It should be long with special characters but must be personal to you. Due to the increasing population of users, the cyberspace more dangerous place so, having unique password is important.

Transition (summary, signpost, preview): Now that we talked about hacking and ways to deal with it, let move on to our final points, which is about identity theft and how it impacts the victim and the third party.

B. Main Point 3: Identity theft is when someone steal your personal information to have financial gain or something that will profit them.

1. Sub point 1: Most common information that identity theft steal, bank information, your social security number or simple thing as your email. Then, they make an account or service such as telephone service or bank account under the victim's name. The worst part of this is sometimes, the victim does not even realize that they are victim of identity theft until they apply for loan or paying new house.
2. Sub point 2: Not only does it affect the consumer, but it also has impact on the online company because consumers are less likely to trust them and make them avoid making any transaction online. In long run, people are going to stop making any purchase due to suspicion.
3. Transition and signal closing: Now that I have covered all my main points, let wrap thing up

Conclusion (Approximately 30 seconds-1 minute)

Restate Thesis: By listening to this speech, hopefully everyone here will now have a deeper understanding of the cybercrime and how it does not only affect famous people, but it affects ordinary people like us.

Review Main Points: In this speech, we learned about cybercrime and three common cybercrimes, which are phishing, hacking and identity theft. We also learned about the ways we can protect ourselves in virtual world.

Memorable Closer: So next time, when you get a call from IRS or any government officials that ask for personal information or money, you can simply hang up the phone.


  1. Global Issues in Context. (2018). Hacking. Retrieved from
  2. IR-2018-40. (2018, March). Phone scams pose serious threat; Remain on IRS 'Dirty dozen' list of tax scams. Retrieved from https://www.irs.gov/newsroom/phone-scams-pose-serious-threat-remain-on-irs-dirty-dozen-list-of-tax-scams
  3. Jakobsson, M., Myers, S. (2007). Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Hoboken, NJ: Wiley-Interscience.
  4. Morgan, S. (2017). Cyber crime damages $6 trillion by 2021. Cybersecurity Ventures.
  5. Schupak, A. (2015, May 12). Majority of americans fall for email phishing scams. CBS News.
Did you like this example?

Cite this page

Explanatory Speech: Cyber Crime. (2019, Aug 19). Retrieved December 1, 2023 , from

Save time with Studydriver!

Get in touch with our top writers for a non-plagiarized essays written to satisfy your needs

Get custom essay

Stuck on ideas? Struggling with a concept?

A professional writer will make a clear, mistake-free paper for you!

Get help with your assignment
Leave your email and we will send a sample to you.
Stop wasting your time searching for samples!
You can find a skilled professional who can write any paper for you.
Get unique paper

I'm Chatbot Amy :)

I can help you save hours on your homework. Let's start by finding a writer.

Find Writer