Preview

computer misuse

Satisfactory Essays
Open Document
Open Document
408 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
computer misuse
Computer misuse:
Computer and internet availability is not a big issue now. Most of the people try to misuse the computer resources. Some willing misuse the computer and some people unknowingly misuse the law. Mentioned below are the categories of computer misuse.
Computer hacking:
Computer hacking is a technique of taking access over the unpermitted network or modem or other devices and the internet. The hackers usually try to grant admittance to the passwords and several different security sites in order to view the confidential information. There some tools used for hacking the sites.
Exploitation of the data, unconstitutional relocation of the data or photocopying:
The information available in the internet is copied through various sources like hard disks, DVDs and pen drives. These types of informal moving of data are done simply with the use of the internet connections. Without having copy rights to access the personal information, research work of any company and novels, books written by the author's one cannot copy the information, but using some illegal techniques they gain access over this information.
Distribution of the copied software's, movies and music:
The software, movies and music is illegally copied without the copy right and they are distributed all over. This can be called as piracy. They do not follow the laws and copy the material without taking permission from the copyright holders.
Abusing people through chat rooms and emails:
Emails, chat rooms are used by some people who simply intend to disturb other individuals. The create email ids with improper identifications and spread news and rumors about famous personalities. They abuse people using chat rooms, they send spam mails to millions of people to market the goods and services that can be sometime legal, but many a times those which are illegal.
Pornography:
Pornography is an illegal activity, and this type offensive stuff is exists on the internet and people store and keep

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking – it is the act of bypassing ones account or database and hacking involves stealing of identity and use it in his/her own interest.…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Explain how the Internet has aided criminal activity. The internet has aided criminal activity by communicating with each other without having to be near, as well as fraud and identity theft. The rise of the Internet over the last decade has paralleled some of the greatest milestones in communications history. Along with such great strides in bringing the world together, the frightening aspect of accessing information and propaganda that tests the very limits of the U.S. Constitution has arrived. Above all, the Internet is used to commit against persons that include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important criminal activity known today. With just a few keystrokes, an individual can have access to all forms of personal information, bomb-making instructions, and poison recipes; and a plethora of extremist ideologies expressing everything from radical religious cults to clandestine organized crime groups.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Better Essays

     Computer as an instrument: Using computers as an instrument, many criminals started making crimes by falsified use of ATM cards for stealing money through online.  Crime where computer is not…

    • 938 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Misuse of this technology and the information accessible to online users can cause potential harm varying in severity. From spam, to cyber-stalking, the legal implications of various internet-related offences can result in fines and jail sentences. The purpose of the internet is to provide, and share information and data between computers. International boundaries are no longer a concern, which proves to be as useful as it is dangerous. Internet users all over the globe are able to act and figuratively hide behind their screens, with the use of anonymity. Anonymity poses a risk on the world wide web, users are able to create their own persona, develop and transfer data without an identity, and even pose as another. The internet may be misused by an individual through the use of anonymity. Untrackable viruses and bots can be created and spread through the wide synapses of the net, transferred from computer to computer through e-mail, downloading malicious files, and unauthorized access of ones personal computer, known as hacking. Another misuse of the internet is the act of copying someone 's work and claiming it as your own, also known as plagiarism. With thousands of documents, files and information readily available across the web on various websites, stealing another 's work is as simple as a copy and paste. Plagiarism and copyright infringement are similar, but not the same. Copyright infringement is a violation of the rights of a copyright holder, when material restricted by copyright is used without consent. On…

    • 1321 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Anthany Nilhas RN IU315

    • 533 Words
    • 2 Pages

    Hacking is activity by one who believes information sharing is a powerful positive good and it also is one who is programmed enthusiastically. Cracking is activity by someone who breaks security on a system. Crakers engage in vandalism, and theft once given access to a computer.…

    • 533 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 311 Words
    • 2 Pages

    Copying and illegally transferring data using online computers and large storage devices (hard disks, memory sticks, DVDs) personal data, company research and written work ( novels, textbooks)…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Computer Hacking

    • 2402 Words
    • 10 Pages

    Computer hacking is a game to which it is their mind against the system. The internet is their tool to gain access to passwords, files, programs, and other valuable information. In addition, all hackers are linked in some way even if they never meet face to face. Hackers tend to cooperate to take down websites, companies, etc. which makes them harder to track.…

    • 2402 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Online Piracy

    • 3023 Words
    • 13 Pages

    Firstly it is crucial to define the terms as especially in case of online piracy they are often misunderstood and are the or controversial. The definition of online piracy varies depending on the source, but the majority agrees that it refers to: “copyright violation, infringement, unauthorised copying, storage, reproduction, distribution, or sale of intellectual property—for example, music CDs, movie videocassettes. With regard to film and television, the term primarily relates to downloading, uploading, linking to, or otherwise providing access to unauthorized copies of movies, television shows or other copyrighted content on the Internet and making and/or selling…

    • 3023 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    The advent of computers has brought significant changes. In recent years, with the development of technology, people use an Internet more than in the past. Many people think computers lead to Internet crime. The increase in internet crime has bought many disadvantages. This essay describes the main causes and effects of internet crime.…

    • 346 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    First of all, the explosion of Internet will increase crime rate. Nowadays, many hackers use the service of Internet to earn illegal money. Hackers often release a trend of malicious software that will falsely alert that you have a virus on your computer and provide a link to purchase software that fixes it. Again this is a form of affiliate marketing and the software makers will be paid when an unsuspecting user purchases the software that they think will clean their computer. This is one of the method uses by hackers to earn illegal money. Besides that, hackers also use Internet to steal private information such as pin number. By doing so, they can easily steal other people money in the bank.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    cyber crime

    • 1724 Words
    • 7 Pages

    In the 21st century, with the improvements in technology and science new concepts are integrated in our lives. Cyber crime is among those concepts that did not previously exist 15-20 years ago. Back In the old day’s only conventional crime was discussed, which refers to those traditional, illegal behaviors that most people think of as crime. In today’s one has to be careful not only against conventional crime but also cyber crime as it is the latest and the most complicated problem in the new century. Cyber crime consists of all criminal actions against communication devices in a network such as Internet, telephone lines or mobile networks. Cyber crime can be observed among people at various age groups as it is easier to commit compared to other types of crime like murder, kidnapping or human trafficking. According to, (Cybercrime.gov, 2009,para8) can divide cyber criminals into four groups. This division may be classified under what they have in their mind. These groups are, children and adolescents between the age group of 6 – 18 years, organized hackers, professional hackers, crackers and discontented employees. Cyber crimes can be divided into 11 groups and each of them is different. Those are unauthorized access to computer systems or networks (hacking), theft of information contained in electronic form, email bombing, data diddling, salami attacks, denial of service attack, virus and worm attacks, logic bombs, Trojan attacks, internet time thefts and web jacking. International estimates announce that cybercrime costs approximately $50 billion annually. Cyber crime costs the United States more than $5 billion per year. According to Michigan State University Library, in England, cybercrime is estimated to cost approximately 250 million pounds or $417.7 million annually. Looking at these figures it can be said that cyber crime is a concept that should be reviewed carefully taking different aspects of it into consideration like the causes, victims and statutory…

    • 1724 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Hacking

    • 306 Words
    • 2 Pages

    The vast majority of the population of the U.S. does not consider computer hackers, who engage in illegal activity, as serious criminals. People do not consider computer hacking a serious crime because they are not directly affected. If a computer hacker taps into a network to gain wi-fi, no one will really care. But if a computer hacker hacks into a home network and steals credit card information to make purchases, then the severity of computer hacking is noticed.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays