Top-Rated Free Essay
Preview

Computer Crime

Good Essays
791 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crime
|

“Computer Crime Is Widespread Which Can Be Mainly Attributed To The Overload of Information on the Internet”

La Rose Brown

Introduction to Computer
Michael Seesahai
September 12, 201 Computer crime is indeed widespread and can be mainly attributed to the overload of information on the internet. Computer crime can be described as any violations of criminal law that involve knowledge of computer technology for their perpetration or criminal acts, committed with a computer. Some examples of Computer crimes are: Identity theft, unauthorized access or modification of program writing or spreading computer viruses or worm, making and digitally distributing child pornography, Industrial espionage by means of access to or theft of computer material, fraud, Internet stalking, cyber terrorism and many more. Even though the Internet has transformed business computing and communications, it has also given rise to unprecedented computer security threats and mainly because of the information that can be gathered off the internet by the violators. The Internet is used for a highway storage capacity and people around the world are highly dependent on storing information on the internet and for sharing or transferring information from one place or point to another. Attack on Businesses Some organizations transfer information between themselves, example Government entities and small businesses, like Colleges, Schools etc. They store Information for learning purposes, like: video, voice, images etc. Most of those Entities / Organizations are not properly secured, which makes their Computer system vulnerable to hackers, who will hack in and steal things such as data, to sell to cyber undergrounds or take control of a server, from where they can attack third parties and conduct many more crimes. “Computer crimes otherwise called cyber crime, is one of the fastest growing areas of crime. . . . this information was published on the web by Interpol, [a trained set of police officers to keep up with the emerging threats of Computer crimes]. More and more criminals are exploring the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities.” Attack on Individuals The Global nature of the Internet has allowed criminals to commit almost any illegal acts and even though some of them do not carry monetary loss, they are just as harmful in the possibility of losing files, information and access to one’s Computer. Some Computer crimes against individuals are as follows: harassment via emails, email spoofing, cyber pornography, cyber stalking, unauthorized control over computer system, indecent exposure, deployment of viruses and many more. Ways to Mitigate Threats to Businesses and Individuals For companies to cause less threat to their systems, they must build safer operating procedures and buy protective software and hardware. They must also test and monitor their systems regularly, to ensure that they are effective against emerging threats. In respect to individuals, care should be taken when posting information on the internet. Credit card information should not be sent on any unsecured websites, neither should any photograph be published online particularly to strangers and chat friends. Since the Internet is not limited by geography, crime committed on the internet can easily achieve global dimension. Systems can be accessed from anywhere in the world and locating perpetrators can be difficult, so one need to educate themselves about the different types of scams that exist on the Internet and how to avert them, by doing so one is putting themselves one step ahead of cyber criminals. Persons should not published critical information about themselves online because such information can leave one vulnerable to harassment which can also be sexual. Adults need to monitor their children when they used the Internet and inform them of the dangers they can get into online if not careful. Care should also be taken when downloading files and soft wares especially from sites that is not trusted and if one gets an email from unknown person claiming that they need to send personal information so that they can claim a prize, such email should be ignored. The less information that is published on the internet is better for an individual. If an organization has to send information from one place to another they should ensure that their system is updated regularly so that scammers will have problems getting into their system thus giving them little or no information to work with.

Bibliography
Computer Crime Research Center – Daily News about computer… www.crime-research.org/ {accessed 12- September-2012}.
Computer crime – Wikipedia, the free encyclopedia - en.Wikipedia.org/wiki/Computer_crime {accessed 12- September – 2012}.
Cybercrime/Cybercrime/crimeareas/Internet/HomeINTERPOI-www.interpol.int/Crime-Areas/Cybercrime {accessed 13-September - 2012}. http://www.Investopedia.com/.../3ways-Cyber-crime-impact-business.aspx {25-Jan-2002}. http://www.SIV.edu.n/Research/pdf/Vishal_Dhot-repdf {accessed 15- September-2012}.

Bibliography: Computer Crime Research Center – Daily News about computer… www.crime-research.org/ {accessed 12- September-2012}. Computer crime – Wikipedia, the free encyclopedia - en.Wikipedia.org/wiki/Computer_crime {accessed 12- September – 2012}. Cybercrime/Cybercrime/crimeareas/Internet/HomeINTERPOI-www.interpol.int/Crime-Areas/Cybercrime {accessed 13-September - 2012}. http://www.Investopedia.com/.../3ways-Cyber-crime-impact-business.aspx {25-Jan-2002}. http://www.SIV.edu.n/Research/pdf/Vishal_Dhot-repdf {accessed 15- September-2012}.

You May Also Find These Documents Helpful

  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    CATEGORIES OF COMPUTER CRIMES:  Targeting the computer: When an attacker/ hacker attacks computer, it would be for stealing the information of marketing. Many criminals hack the website of government records and can change the details of warrant and tax information- which is a crime. The best example can be given from the book of “The Cuckoo's Egg” by Cliff Stoll. In that book, the hacker from Germany penetrates into to the computers of military and several universities in the USA to sell the national security information to the foreign countries.…

    • 938 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Computers have become a big part of our lives. They are being used more and more and the Internet has brought with it a big amount of computer criminals. In 1988, Victoria created the first Australian computer crime laws.…

    • 1206 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    There are several different theories that could be used to describe those who commit computer crimes. I am going to summarize Choice Theory and why I think it is most relevant to computer crimes. The Choice Theory basically in a nut shell says that a person will choose to commit a crime even after weighing the positive and negative outcomes of doing so. To this person they see a quick opportunity to make money or cause a disruption and no matter what the consequence will still choose to offend. There are other types of crimes that could be related to this theory as well such as theft, burglary and robbery. When…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 482 Words
    • 2 Pages

    This article gives a good overview of actual computer crimes and general information and examples such…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cybercrime is any crime that is committed online or through the use of an electronic device such as a computer or smartphone. Cybercrime is very broad and can be anything from stealing money online to downloading illegal files. The creation and distribution of viruses on to others computers is a very popular cybercrime. The most prominent cybercrime is identity theft through pharming and phishing techniques used by criminals to steal personal information. Cybercrime is increasing as technology increases because criminals are finding it easier to get personal information from almost anywhere. Not only individual electronic devices are being attacked, businesses are also becoming attacked where many people are falling victim.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    Cyber Crime in America

    • 624 Words
    • 3 Pages

    Some of the crimes whose primary target is the computer or devices within the computer include computing or creating viruses, malicious and malware codes and denial of service attacks. On the other hand activities that would fall under the second category include identity theft, cyber stalking, information warfare and fraud (Siegel, 2008).…

    • 624 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Crime is an area of the law in which the government is constantly adding new offenses to keep up with the growth in new technologies. Federal and California Penal Codes include provisions covering computer crime such as contaminant into a computer system and using computers as part of a scheme to defraud.…

    • 448 Words
    • 2 Pages
    Good Essays
  • Better Essays

    WiseGeek.com defines cybercrime as “any type of illegal activity that makes use of the Internet, a private or public network, or an in-house computer system.” Examples involving this crime are: software that are designed in order to steal…

    • 794 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Computer Fraud and Crimes

    • 1013 Words
    • 5 Pages

    amounts of memory being used and the file usage if something is going on that…

    • 1013 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cybercrime

    • 448 Words
    • 2 Pages

    2. Thesis: Cybercrime is one of the leading causes of devastation in society today because of how victims are easily targeted due to lack of knowledge of this far reaching and multifaceted crime. Americans need to take the initiative to properly educate themselves on how to accurately steer clear of cybercrime.…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mr Mohdall

    • 5870 Words
    • 24 Pages

    An area of the law that is changing very quickly in the modern world is the law related to computer crime. Increasingly, criminals are using computers to help them commit new crimes like identity theft, to make it easier to commit old crimes like theft or fraud. Technological criminals may get into computer systems to find out confidential information and use this to make money.…

    • 5870 Words
    • 24 Pages
    Good Essays