Preview

Categories of Crime Crimes

Satisfactory Essays
Open Document
Open Document
820 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Categories of Crime Crimes
Categories of Computer Crime
Smith
Strayer University
CIS170 Wk2
Professor Masudur Chowdhury
July 4, 2013

Explain in detail the four common categories of computer crimes and provide at least one example for each.
There are many different types of computer crime and multiple ways to categorize them. I will discuss four categories in detail to shine light on how vulnerable people are, when we choose to use a personal or publicly used computer to transmit confidential information, conduct business transactions or transfer funds between accounts. Even the most knowledgeable experts on computers are not exempt from being victims of computer crimes.
The Computer as a Target
Crime can happen in many different ways. One of the most common areas is the use of the computer. According to Ronald B. Standler, there are three major classes of criminal activity with computers. The first way is unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victim's computer via the Internet through a backdoor, operated by a Trojan Horse program. The second way is creating or releasing a malicious computer program (e.g., computer virus, worm, Trojan Horse). The third ways is harassment and stalking in cyberspace. Often time people are not properly educated on how to reduce the risk of becoming a victim of computer crimes. In this day and time we all need to take more responsibility to help protect our personal information when we are using the computer.
The Computer as an instrument of the Crime
Computer technology can be used to implement plans of action to commit crimes. This type of criminal is labeled as cybercriminal. Cybercriminals may hack into personal financial accounts to access funds. They might attack website databases in order to gain access to consumer details, such as social security numbers, that can be used to take out credit cards or loans in another person’s name. Also

You May Also Find These Documents Helpful

  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Physical crimes never cease to draw our attention. Victims, bloodiness, drama, motives, psychological issues and conflicts: they are at the heart of most physical crimes. Cyber crimes are not viewed as dramatic and pervasive by many, but its consequences can be even bloodier within seconds: hundreds of millions of victims and billions of dollars can be rapidly caused with two elements, a criminal mind and one computer. We are not safe from either bloody crimes or cyber crimes such as cyberstalking, cyberbullying, and financial theft. In fact, “cybercrime affects everyone-business, governments, and citizens.” (2). Wealth, a safe neighborhood, or bodyguards…

    • 1487 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    References: Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.…

    • 1568 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cyberbullying In Canada

    • 1966 Words
    • 8 Pages

    It has been a routine that when someone needs something, he or she can proceed to the Internet for his or her need to be catered. But on the other side of the Internet, crimes after crimes spread. Anything that takes place in cyberspace, or all electronic or internet means of communication can potentially produce cyber victims. A Cybercriminal use the computer as their object…

    • 1966 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Computer crime is an ongoing issue that we continuously see, and a major problem with this is that most people do not realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is based on the fact that there are many different perceptions about what computer crime is, and the harmful effects it can have. Because there is a gap between traditional views of what cyber crime is and the actual realities of these crimes, it is a criminal offense that will continue to happen.…

    • 1102 Words
    • 5 Pages
    Better Essays
  • Better Essays

    When an intruder hijacks your computer and denies you entry into your files or your network this is considered targeting your computer. Viruses and Malware also can be introduced to your computer to damage your operating system, your files or just give you a headache.…

    • 870 Words
    • 4 Pages
    Better Essays
  • Better Essays

    CATEGORIES OF COMPUTER CRIMES:  Targeting the computer: When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.…

    • 938 Words
    • 4 Pages
    Better Essays
  • Good Essays

    This type of crime is the illegal exploitation of computer technologies, usually involving the Internet, to support crimes such as fraud, identity theft, sharing of information, and embezzlement.…

    • 803 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cyber Crime

    • 3651 Words
    • 15 Pages

    COMPUTER CRIME is any crime where – Ø Computer is a target. Ø Computer is a tool of crime Ø Computer is medium to crime…

    • 3651 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crimes

    • 1477 Words
    • 5 Pages

    Computer crimes are considered to be an illegal criminal activity that uses technology to retrieve unauthorized data and information from a computer system (Buzzle, 2010, p. 1). There are various types of computer crimes. Viruses and worms are used by hackers to penetrate computer programs with the intention of doing harm that, in some cases, result in the demise of the computer itself. However, not all computer crimes include physical property damage. These types of crimes include; “altering data, deleting information, and manipulating classified information” (Buzzle, 2010, p. 1).…

    • 1477 Words
    • 5 Pages
    Powerful Essays