Preview

Computer Crime

Better Essays
Open Document
Open Document
1584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime
Computer Crime
This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.
Exactly what is illegal varies greatly from state to state. Consequently, the growth of international data communications and in particular the Internet has made these crimes both more common and more difficult to police. Luckily there are people fighting computer crime and it is taken very seriously by government agencies. In particular the U.S. Department of Justice has an extensive computer forensics team.
Computer crime can be broken down into two basic categories. Crimes that are aimed at IT systems, and crimes that turn IT systems into weapons to target other systems and information.
Examples of crimes aimed at IT systems are:
- Unauthorized access to or modification of programs (software cracking and hacking).
- Spamming wherever outlawed completely or where regulations controlling it are violated.
- Deliberate circumvention of computer security systems.
- Writing or spreading computer viruses or worms.
- Denial-of-service attack, where company websites are flooded with service requests and their website is overloaded and either slowed or crashes completely.
Examples of crimes which use IT systems as weapons are:
- Fraud achieved by the manipulation of computer records.
- Intellectual property theft, including software piracy.
- Industrial espionage by means of access to or theft of computer materials.
- Identity theft where this is accomplished by use of fraudulent computer transactions.
- Salami slicing is the practice of stealing money repeatedly in extremely small quantities.
- Making and digitally distributing child pornography.
Most Common Computer Crimes
Hacking. Breaking into a computer system to gain an unauthorized access is known as hacking. This entails defeating the security capabilities of a computer system in order



Bibliography: Computer Security, by Dieter Gollman Computer Security Basics, by Debby Russell http://www.crime-research.org/ http://www.buzzle.com/ http://www.techiwarehouse.com/ http://www.anti-phishing.info/ http://www.worldsecuri

You May Also Find These Documents Helpful

  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    There are several different theories that could be used to describe those who commit computer crimes. I am going to summarize Choice Theory and why I think it is most relevant to computer crimes. The Choice Theory basically in a nut shell says that a person will choose to commit a crime even after weighing the positive and negative outcomes of doing so. To this person they see a quick opportunity to make money or cause a disruption and no matter what the consequence will still choose to offend. There are other types of crimes that could be related to this theory as well such as theft, burglary and robbery. When…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CATEGORIES OF COMPUTER CRIMES:  Targeting the computer: When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.…

    • 938 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    A stated on the Law and Legal Information Web site, “A precise definition of computer crime is problematic’ (Law.jrank.org, n.d). Delving further into an explanation, one finds, “This is because of the array of different forms and forums in which the crime may appear. A single category cannot accommodate the wide divergence of conduct, perpetrators, victims, and motives found in examining computer crimes. Adding to this confusion is the fact that computer crimes also can vary depending upon the jurisdiction criminalizing the conduct. The criminal conduct can be the subject of punishment under a state statute. There is also…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such. Information about what is involved in a computer crime and what the laws enforced are all discussed in this article.…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Another type of international crime is cybercrime. Cybercrimes are committed from a computer or a network and are different from most other crimes. According to McConnell International (2000), “They are easy to learn how to commit; they require few resources relative to the potential damage caused; they can be committed in a jurisdiction…

    • 888 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Computer Crime is an area of the law in which the government is constantly adding new offenses to keep up with the growth in new technologies. Federal and California Penal Codes include provisions covering computer crime such as contaminant into a computer system and using computers as part of a scheme to defraud.…

    • 448 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Cyber crime, also referred to as computer crime comprises of all crimes that are committed using a computer or with the help of a computer. Cyber crime is not a single activity but instead there are various activities that may be categorized as cyber crimes. However, the major activities involved include illegal or unauthorized access of information or data, interception of data from the computer illegally, unauthorized damaging or deletion of data from the computer, misuse of devices and committing fraud by electronic means (Broadhurst, 2005).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    According to Posadas(2013), what many of these little learners (and their parents) do not know, however is that they might be losing a portion of their privacy with each log-in or site visit, e-mail sent, downloaded application, or simply clicking a button.…

    • 635 Words
    • 3 Pages
    Good Essays