Some references differentiate between computer crime and net-crime, categorising that computer crime involves a computer or network but not specifically the internet while net-crime defines crimes committed over the internet using a computer or other device that provides access to the www . (Cyber Awareness Program & Stair & Reynolds) In this topic we will be discussing six computer crimes and how they are committed. We will also look at laws that protect users against these specific crimes. At the end, we will look at ways in which users and corporations can protect themselves against computer crimes physically, using software, electronically and what controls management can implement to safeguard company IS infrastructure. At the end, we will explain ways in which individuals as well as company management can safeguard against computer crime. Crimes 1) Hackers attacking organisations' Information Systems This is defined as the unorthodox access to private computer system by an individual or group in order to gain information, a prominent status, experiment or simply to explore or cause damage. This however under the Computer Misuse Act of 1990, The Computer Fraud and Abuse Act of 1986 among others, is an illegal activity since it violates regulations on Unauthorised Access to Computer Material as well as Human Rights laws of Privacy. There are many variations and intensities of this crime but
References: Parker, D. (1998) Fighting computer crime: a new framework for protecting information. Wiley, Chichester. BBC (2008) Government loses one PC a week University of Wolverhampton (2004) CP3349: Social, legal and professional aspects of computing