There are many pros and cons of some new types of technology which are been invented or discovered. Similarly the new & profound technology i.e. using of INTERNET Service, has also got some pros & cons. These cons are named CYBER CRIME, the major disadvantages, illegal activity committed on the internet by certain individuals because of certain loop-holes. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade our privacy and offend our senses. Criminal activities in the cyberspace are on the rise.
Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical information. Computer crimes involve activities of software theft, wherein the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have necessitated the introduction and use of newer and more effective security measures.
TYPES OF CYBER CRIME
Hacking in simple terms means an illegal intrusion into a computer system or network. There is an equivalent term to hacking i.e.... [continues]
Cite This Essay
(2011, 11). Cyber. StudyMode.com. Retrieved 11, 2011, from http://www.studymode.com/essays/Cyber-824954.html
"Cyber" StudyMode.com. 11 2011. 11 2011 <http://www.studymode.com/essays/Cyber-824954.html>.
"Cyber." StudyMode.com. 11, 2011. Accessed 11, 2011. http://www.studymode.com/essays/Cyber-824954.html.