Monday, March 7, 2011

Privacy & Security

COMPUTER CRIMES
Definition
- crime activities, involve the use of the use of information technology to gain an illegal or an 
   unauthorized access to a computer system with intent of :
        -damaging
        - deleting  
        -altering computer data
- include the activities like electronic frauds, misuse of devices, identity theft, software theft 
   and data as well as system interference 


Types of computer criminals


-these are some types of computer criminals :


1) Hacking
2) Cracking
3) Computer viruses
4) Cyberstalking
5) Identity theft




1) HACKING


-breaking into a computer system or defeating security capabilities to gain an unauthorized   
  access 
-e.g. hacking of IP addresses in order to transact with a false identity
-known as hackers
-hackers generally deplore cracking


Images of hacking




2) CRACKING


- breaking into a computer system often a network to point out weaknesses in a site's security 
  system
-by passwords / license in a computer programs / breaches computer security
-known as cracker




3) COMPUTER VIRUSES


- can replicate themselves and harm the computer systems on a network without the 
   knowledge of the system users




Images of computer viruses
-viruses spread  through network file system,  network, 
  Internet or by the removable devices like USB drives and 
  CDs
-it forms of malicious codes written with an aim to harm a 
  computer system and destroy information
















4) CYBERSTALKING
Images of cyberstalking


-use of communication technology,like Internet, to torture other individuals
-cyberstalking activities include :
       -false accusations
       - transmission of threats and 
       -damage to data and equipment 
-cyberstalkers target the user at the chat room, online forums and social networking websites 
  to gather and harass the user information




5) IDENTITY THEFT


-involves stealing money and obtaining other benefits through the use of a false identity 
-act of pretending to be someone else by using someone else's identity as one's own
-financial identity theft involves the use of a false identity to obtain goods and services
Images of identity theft

                                           
-commercial identity theft is the using of someone else’s business name or credit card details 
  for commercial  purpose
-identity cloning is the use of another user's information to pose as a false user
-e.g. illegal migration, terrorism and  
         blackmail 




REFERENCES :
 a)  http://www.buzzle.com/articles/types-of-computer-crimes.html
 b)  http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211852,00.html

0 comments: