top-rated free essay

Computer Crime

By Brown53 Jun 24, 2013 791 Words
|

“Computer Crime Is Widespread Which Can Be Mainly Attributed To The Overload of Information on the Internet”

La Rose Brown

Introduction to Computer
Michael Seesahai
September 12, 201
Computer crime is indeed widespread and can be mainly attributed to the overload of information on the internet. Computer crime can be described as any violations of criminal law that involve knowledge of computer technology for their perpetration or criminal acts, committed with a computer. Some examples of Computer crimes are: Identity theft, unauthorized access or modification of program writing or spreading computer viruses or worm, making and digitally distributing child pornography, Industrial espionage by means of access to or theft of computer material, fraud, Internet stalking, cyber terrorism and many more. Even though the Internet has transformed business computing and communications, it has also given rise to unprecedented computer security threats and mainly because of the information that can be gathered off the internet by the violators. The Internet is used for a highway storage capacity and people around the world are highly dependent on storing information on the internet and for sharing or transferring information from one place or point to another. Attack on Businesses Some organizations transfer information between themselves, example Government entities and small businesses, like Colleges, Schools etc. They store Information for learning purposes, like: video, voice, images etc. Most of those Entities / Organizations are not properly secured, which makes their Computer system vulnerable to hackers, who will hack in and steal things such as data, to sell to cyber undergrounds or take control of a server, from where they can attack third parties and conduct many more crimes. “Computer crimes otherwise called cyber crime, is one of the fastest growing areas of crime. . . . this information was published on the web by Interpol, [a trained set of police officers to keep up with the emerging threats of Computer crimes]. More and more criminals are exploring the speed, convenience and anonymity that modern technologies offer in order to commit a diverse range of criminal activities.” Attack on Individuals The Global nature of the Internet has allowed criminals to commit almost any illegal acts and even though some of them do not carry monetary loss, they are just as harmful in the possibility of losing files, information and access to one’s Computer. Some Computer crimes against individuals are as follows: harassment via emails, email spoofing, cyber pornography, cyber stalking, unauthorized control over computer system, indecent exposure, deployment of viruses and many more. Ways to Mitigate Threats to Businesses and Individuals For companies to cause less threat to their systems, they must build safer operating procedures and buy protective software and hardware. They must also test and monitor their systems regularly, to ensure that they are effective against emerging threats. In respect to individuals, care should be taken when posting information on the internet. Credit card information should not be sent on any unsecured websites, neither should any photograph be published online particularly to strangers and chat friends. Since the Internet is not limited by geography, crime committed on the internet can easily achieve global dimension. Systems can be accessed from anywhere in the world and locating perpetrators can be difficult, so one need to educate themselves about the different types of scams that exist on the Internet and how to avert them, by doing so one is putting themselves one step ahead of cyber criminals. Persons should not published critical information about themselves online because such information can leave one vulnerable to harassment which can also be sexual. Adults need to monitor their children when they used the Internet and inform them of the dangers they can get into online if not careful. Care should also be taken when downloading files and soft wares especially from sites that is not trusted and if one gets an email from unknown person claiming that they need to send personal information so that they can claim a prize, such email should be ignored. The less information that is published on the internet is better for an individual. If an organization has to send information from one place to another they should ensure that their system is updated regularly so that scammers will have problems getting into their system thus giving them little or no information to work with.

Bibliography Computer Crime Research Center – Daily News about computer… www.crime-research.org/ {accessed 12- September-2012}. Computer crime – Wikipedia, the free encyclopedia - en.Wikipedia.org/wiki/Computer_crime {accessed 12- September – 2012}. Cybercrime/Cybercrime/crimeareas/Internet/HomeINTERPOI-www.interpol.int/Crime-Areas/Cybercrime {accessed 13-September - 2012}. http://www.Investopedia.com/.../3ways-Cyber-crime-impact-business.aspx {25-Jan-2002}. http://www.SIV.edu.n/Research/pdf/Vishal_Dhot-repdf {accessed 15- September-2012}.

Cite This Document

Related Documents

  • Cyber Crime Law

    ...Joana Rossette D. Cencia BS – Hospitality Management Intro to Computer Science / GEEL 211 31 August 2013 Cyber Crime Law (RA 10175) and its Implication “The Cybercrime Prevention Act of 2012 (Republic Act No. 10175, An Act Defining Cybercrime, Providing For The Prevention, Investigation, Suppression And The Imposition Of Penalties T...

    Read More
  • Perception of Cybercrime and Computer-Related Deviancy

    ...Perception of Cybercrime and Computer-related Deviancy In the last few years, the number of computer and internet related crimes has increased greatly. Due to the technological nature of these crimes, the greatest challenge faced is how to deal with finding the perpetrators. For example, cybercriminals often use secure software in ord...

    Read More
  • cyber crime

    ...KPMG INTERNATIONAL Issues Monitor Cyber Crime – A Growing Challenge for Governments July 2011, Volume Eight kpmg.com John Herhalt Global Chair, Government Keeping up to date with the very latest and most pressing issues facing your organization can be a challenge, and while there is no shortage of information in the public d...

    Read More
  • Cyber Crime

    ...Research Proposal Comp 328 A Research Proposal Submitted to the School of Science, Engineering and Technology in Partial Fulfilment of the Requirements for the Award of the Degree of Bachelor of Science in Computer Science Control of Cyber Crime in IT Industries in Kenya. FACULTY OF SCIENCE ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUT...

    Read More
  • cyber crime

    ...MONOGRAPH ON CYBER CRIME AND THE CONTRIBUTIONS OF SOCIAL SITES TO CYBERCRIMES Abstract Facebook has become a force to reckon with in the field of social networking. It has been ranked as the number one social networking site with a membership of over five hundred million. It has earned trust from many people who have in turn exposed their in...

    Read More
  • Global Crimes Analysis

    ...Global Crimes Analysis Brittany Kaloi CJA 394 September 24, 2012 Christopher Manning Global Crimes Analysis In this paper it will identify the various major global crimes and criminal issues that have a global impact on national and international justice systems and processes. This paper will discuss many of the important global crime...

    Read More
  • Internet Crime and Moral Responsibility

    ...Internet Crime and Moral Responsibility Internet Crime and Moral Responsibility 3 Introduction 3 What is Internet Crime? 3 Types of Crimes 3 Phishing 3 Child Pornography 4 Cyber Stalking 5 Computer Intrusion 5 Denial of Service Attacks and Cyber War 5 Identity Theft 6 Whose responsibility is it to report these crimes? 7 Reportin...

    Read More
  • Introduction to CYber Crime

    ...CYBER CRIME IN ITS VARIOUS FORMS kimmyarora33@gmail.com Abstract: This Paper is a review paper on the topic of Cybercrime and its forms. The paper describes very basic information about cybercrime. It includes introduction to cyber crime, its brief history, its types along with their brief description, today’s scenario regarding cyberc...

    Read More

Discover the Best Free Essays on StudyMode

Conquer writer's block once and for all.

High Quality Essays

Our library contains thousands of carefully selected free research papers and essays.

Popular Topics

No matter the topic you're researching, chances are we have it covered.