Preview

Computer Fraud and Crimes

Better Essays
Open Document
Open Document
1013 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Fraud and Crimes
Computer Fraud and Crimes

In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. If the proper steps are not taken, safe computing may become a thing of the past. Many security measures are being implemented to protect against illegalities.

Companies are becoming more aware and threatened by the fact that their computers are prone to attack. Virus scanners are becoming necessities on all machines. Installing and monitoring these virus scanners takes many man hours and a lot of money for site licenses. Many server programs are coming equipped with a program called "netlog." This is a program that monitors the computer use of the employees in a company on the network. The program monitors memory and file usage. A qualified system administrator should be able to tell by the amounts of memory being used and the file usage if something is going on that should not be. If a virus is found, system administrators can pinpoint the user who put the virus into the network and investigate whether or not there was any malice intended.

One computer application that is becoming more widely used and, therefore, more widely abused, is the use of electronic mail or email. In the present day, illegal hackers can read email going through a server fairly easily. Email consists of not only personal transactions, but business and financial transactions. There are not many encryption procedures out for email yet. As
Gates describes, soon email encryption will become a regular addition to email just as a hard disk drive has become a regular addition to a computer (Gates
p.97-98).

Encrypting email can be done with two prime numbers used as keys. The public key will be listed on the Internet or in an



Cited: Bitter, Gary G., ed. The MacMillian Encyclopedia of Computers. MacMillian Publishing Company: New York, 1992. Gates, William. The Road Ahead. New York : Penguin Books, 1995. Hafner, Katie & John Markoff. Cyberpunk. New York : Simon and Schuster, 1991. Romney, Marshall. "Computer Fraud – What Can Be Done About It?" CPA Journal Vol. 65 (May 1995): p. 30-33.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    memory changes on how it is set. It either can be added or reduced from the computer.…

    • 281 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hacker Motivation: (Experiment) Not intended to be malicious, the virus was designed by BBN Technologies engineer Bob Thomas to explain how a virus could infiltrate, and be…

    • 735 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Computer Fraud Case Study

    • 447 Words
    • 2 Pages

    1.How does the citizenship status of the criminal in the case impact the ability to adhere to procedural due process? Be sure to include whether the criminal has dual citizenship. How does this affect the ability to apprehend and charge the criminal?…

    • 447 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Digital Crime

    • 542 Words
    • 3 Pages

    The purpose of this paper is to explain the existing challenges that result from the independent nature of federal agencies, as well as the other factors that are common to each of them and discuss how the U.S. could align these efforts to better protect the nation against digital crimes and terrorism.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    for the hacker is for financial gain. Cybercrime is about making a profit and continuing to make…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Digital Crime

    • 611 Words
    • 2 Pages

    The NSA is the agency responsible for monitoring and protecting the federal government computers and networks against digital crime attacks. Most of the work that the NSA does is very secretive, therefore we do not hear about a lot of their success. The do provide information security training to many different government and private agencies, they also provide information security through security tools, security products, threat warnings, analysis of attacks and security bulletins. (Taylor and Fritsch, 2011)…

    • 611 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Fraud and Abuse

    • 953 Words
    • 4 Pages

    The article “To Catch A Thief” is written to inform individuals about the different down falls of being a victim of identity theft. Experts believe that medical identity theft is increasing and now with all new technology it is hard to detect the costs of thieves. Taking people’s medical identity does not just affect that person it has a huge effect on the health care billing system. They are charged millions of dollars because of an incident. Studies show that ninety six percent of hospitals reported one data breach in two years. This shows that the average cost of data breaches rose and will continue to rise depending on how many theft incidents will occur in a time period. Data breaches also roll over into hospitals, which means it will run them around twelve billion dollars.…

    • 953 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Computer Fraud Act Essay

    • 549 Words
    • 3 Pages

    The Computer Fraud and Abuse Act is a law passed by the United States Congress in 1986 intended to reduce cracking of computer systems and to address federal computer-related offenses. The Computer Fraud and Abuse Act (codified as 18 U.S.C. § 1030 governs cases with a compelling federal interest, where computers of the federal government or certain financial institutions are involved, where the crime itself is interstate in nature, or computers used in interstate and foreign commerce. It was amended in 1988, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act. Subsection (b) of the act punishes anyone who not just commits or attempts to commit an offense under the…

    • 549 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Carter, David. (1995, July). Types of computer crimes. The FBI Magazine, Retrieved from http://www.lectlaw.com/files/cri14.htm, doi: The Lectric Law Library…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    In this lab, you used AVG AntiVirus Business Edition to identify the viruses, worms, Trojans,…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Identity theft is one of the fastest growing crimes statistically according to the Federal Trade Commission. Roughly 27.3 million Americans have fallen victim to this form of theft/fraud. According to last year the loss of money for businesses and financial institutions are in the billions and with consumers out of pocket expenses has been about 5 billion dollars. "Identity theft" refers to crimes in which someone wrongfully obtains and uses another person's personal data (i.e., name, date of birth, social security number, driver's license number, and your financial identity— credit card, bank account and phone-card numbers) in some way that involves fraud or deception, typically for economic gain (to obtain money or goods/services). There are a few ways that people are able to obtain such information and some of the ways you will find that it is out of your control if you do not protect yourself. A few of the forms in which predators are able to easily extract your information and use it while damaging your life and credit. Some are done from people internally stealing business records of their personal information. Other means from what they call shoulder surfing. This is an easy way where someone is standing behind you at your desk while you are trying to visit a site that is personal. They are able to look at your keyboard and remember your login and passwords. Another big one would be dumpster diving. People do not realize that just by simply not shredding your personal information and just tossing it in the garbage people will go through your garbage to collect information about yourself. Once your trash can is at the end of your driveway this is now considered public property. Another means is to deceive the victim through the means of posing as someone else to obtain information such as a landlord or even posing as an employer trying to get your personal information. Another one would be from what they call skimming. This is done by stealing…

    • 3646 Words
    • 15 Pages
    Better Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays