• Home   /  
  • Archive by category "1"

Computer Crime Essay

Essay about Computer Crimes

1116 Words5 Pages

Computer Crimes
Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future.
Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime. None of these categories are exclusive and many activities can be characterized as falling in one or more category. Even though it states that the computer crime is when something…show more content…

However, it releases codes that causes the computer to do whatever is written in the code. Cyberterroism is terrorism done using the computer in some sort of way. Email abuse/harassment is when people use the computer to harass you whereas prior to the computer it was done via regular mail.
The growth of computer crime rapidly started in the 1970’s. Although a lot of people don’t see it, it is becoming into a problem which involves and has influences on nearly every aspect of our modern society. Due to the influence of computer crime, it has definetly changed the political, economocial, cultural and also military aspects of our society.
There are a lot of crimes that are easier to commit when using a computer. Examples of the easy to commit crimes are fraud, false inputting, fake output, forgery, theft of information, and eavesdropping. These are just a few although there are more out there.
Some of the manipulation of computers include data files, attack on hardware, theft of software, comprised measuring devices, hacking by both employees and/or outsiders, etc. In other words, there are many different types of ways to manipulate a computer.
A perpetrator is a person who actually commits the crime. Some of the perpetrators involved with computer crimes are ex-empolyees, terrorist, hackers, extortionists, employees, etc. You should never put too much trust in anyone
A list of consequences of

Show More

Internet is growing today but many people have become victims of hacking, theft, cyber stalking, Child soliciting etc. which are various types of cyber crimes. Cyber crime is committed over the internet. Lawmakers, law enforcement, and individuals need to know how to protect themselves and the people for which they are responsible. The following are different types of Cybercrimes.

  • Hacking
  • This type of crime is done when a person’s computer broken into by an unauthorized users. So, the personal and sensitive information is stolen by the unauthorized person. The criminal uses a variety of software to hack a person’s computer irrespective its location.

  • Theft
  • When a person downloads music, movie, video, eBook, games and various software(software piracy) by violating copyrights –this is one of the cyber crime.

  • Electronic Fund Transfer Crime
  • In this crime, a criminal accesses information about a person’s bank account, credit cards, social security, debit card and other sensitive information which results in major financial losses of the person and even spoils the person’s credit history. This crime happened for cash transactions of e-marketing and other banking services.

  • Malicious software
  • This internet-based software or programs used to disrupt a network. This software not only steals sensitive information/data but causing damage to another software present in the system.

  • Cyber Stalking-
  • This is a kind of online harassment where crime used to send various illegal online messages or emails. So, the targeted persons’ lives are more miserable.

  • Child soliciting and abuse-
  • In this crime, criminals solicit minors via chat room for the purpose of child pornography.

  • Electronic vandalism, terrorism and extortion-
  • A number of individual and protest groups have hacked the official web pages of various governmental and commercial organizations even the defense information of a country.

  • Telemarketing Fraud
  • Cyberspace now abounds with a variety of investment opportunities such as stocks, bonds, sale of items, online lotteries etc.

  • Denial-of-service Attack-
  • Denial-of-service referred the act by which a user of any website or service denied to the use of service of the website. So, crimes target the web server of the website and flow a large number of requests to that server. This causes use of maximum bandwidth of the website and the targeted website goes slow down or not available for some time.

  • Data Diddling-
  • It is an unauthorized alteration of data. This is done by virus programs that change the system’s data which is entered by the user.

  • Spamming and Email Bombing-
  • Spam (junk mail) is a message sends by the criminal with a web link or some business proposal. Clicking in this link results to install a malware into our system or redirect to a phishing website.

    Email Bombing is a technique where criminal sends a huge number of emails to target address. So, the target email address or mail server crashed.

    One thought on “Computer Crime Essay

    Leave a comment

    L'indirizzo email non verrà pubblicato. I campi obbligatori sono contrassegnati *