COMPUTER CRIMES
Definition
- crime activities, involve the use of the use of information technology to gain an illegal or an
unauthorized access to a computer system with intent of :
-damaging
- deleting
-altering computer data
- include the activities like electronic frauds, misuse of devices, identity theft, software theft
and data as well as system interference
Types of computer criminals
-these are some types of computer criminals :
1) Hacking
2) Cracking
3) Computer viruses
4) Cyberstalking
5) Identity theft
1) HACKING
-breaking into a computer system or defeating security capabilities to gain an unauthorized
access
-e.g. hacking of IP addresses in order to transact with a false identity
-known as hackers
-hackers generally deplore cracking
Images of hacking |
2) CRACKING
- breaking into a computer system often a network to point out weaknesses in a site's security
system
-by passwords / license in a computer programs / breaches computer security
-known as cracker
3) COMPUTER VIRUSES
- can replicate themselves and harm the computer systems on a network without the
knowledge of the system users
Images of computer viruses |
Internet or by the removable devices like USB drives and
CDs
-it forms of malicious codes written with an aim to harm a
computer system and destroy information
4) CYBERSTALKING
Images of cyberstalking |
-use of communication technology,like Internet, to torture other individuals
-cyberstalking activities include :
-false accusations
- transmission of threats and
-damage to data and equipment
-cyberstalkers target the user at the chat room, online forums and social networking websites
to gather and harass the user information
5) IDENTITY THEFT
-involves stealing money and obtaining other benefits through the use of a false identity
-act of pretending to be someone else by using someone else's identity as one's own
-financial identity theft involves the use of a false identity to obtain goods and services
Images of identity theft |
for commercial purpose
-identity cloning is the use of another user's information to pose as a false user
-e.g. illegal migration, terrorism and
blackmail
REFERENCES :
a) http://www.buzzle.com/articles/types-of-computer-crimes.html
b) http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci211852,00.html
0 comments:
Post a Comment