StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crimes Categories - Essay Example

Cite this document
Summary
The paper "Computer Crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments. The site should use an encryption symbol, in a bid to secure personal information…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful

Extract of sample "Computer Crimes Categories"

Computer Crimes Computer crimes categories In the recent past, there have been a massive growth and rise of computer technology. Almost everything is then dependent upon computer and computer software. The immense growth of the computer use and utilization in all sphere of the world have led to the eruption of cybercrime, which simply refers to any crime that is committed over the internet through a computer. Primarily, cybercrime does utilize the computer as to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft. Another type of cybercrimes that may exist includes hacking of important webpages and spamming. Such acts are at the verge of creating tensions in many countries, leading to insecurity. The advent of computers has led to a rampant evolvement of cybercrimes. There does exist at least four classifications of computer crimes. The computer can be the crime target, in that there is data alteration hence it cannot provide the expected service. The information in the computer is attacked, hence interrupting all the operations. Secondly, the computer can be an instrument in crime. In such a case, one uses a computer to participate in a crime. The crime is mostly common especially to people who utilize illegal means to solicit funds. On the other hand, the prevalence of computers can be associated with crimes. Such crimes may include counterfeiting of the software and theft. Lastly, computer can remain an incidental substance in crime proceedings. It can act as a facilitator. An example in such a case is Child Pornography (Carucci, Overhuls, and Soares, pg. 388). In essence, privacy of information remains a critical component in every organization. However, the invention of the computers has posed great risks to the information, and most firms have to remain on watch at tall times to prevent any imposter who may be at the verge of interfering with their privacy. It is worth noting that most companies are opting to heighten their web security to secure information. Computer viruses, Trojan horses and malwares are dangerous programs designed with the ultimate goal of damaging the computer system. Virus has had devastating impacts on the information stored in the computers, causing unexpected disruptions in the flow of activities. They have made many firms incur huge losses of billions of dollars due to information loss. Viruses tend to pass from one computer to another. They can be likened to biological viruses. The agents of destruction target the hardware. The victim creating such a virus targets it to create a certain level of harm to the computer hardware. In the recent past, virus creators have come up with immense tricks. For example, they have initiated an action whereby a virus can be in a potion to load into the computer memory, and can just run on the background computer as long as the computer is on operation. In such a case, the virus has the best opportunity to replicate. Floppy discs and hard discs are not left behind but are also at risk of attack. Trojan horses are fatal programs found within other programs. On the installation, such programs do infect other files in the computer, causing confusion and mayhem. Sometimes, they can send the computer private information to a third party, who can control all the operational processes of the computer. Such applications developers utilize spamming by sending messaged to thousands of unsuspecting people. They end up downloading the documents and opening them, hence propagating the infections (Huang, Radkowski III, and Roman, pg. 285). Spamming involves sending thousands of similar messages to many unsuspecting people. It forces the same message to many people and is usually a commercial advertisement. It is quite cheap to send such mails. Spams have detrimental implications to the email system of the user. The recipient is not in a position to communicate effectively. Time is wasted hence decreasing the productivity levels. Denial of Service Attacks does occur when an attacker makes an offer to prevent certain users from accessibility of certain information. Other types of cybercrime activities include phishing, smishing, and vishing. Phishing entails receiving emails that are spoof and mimicking companies that deal with money transactions, such as PayPal, eBay or Amazon. They try to steal personal financial data and information. They can be at the verge of convincing other people to become participants of illegal activities (Schmalleger, pg. 48). Phishers utilize such methods to trick most people to reveal their financial information. Sometimes phishers can make use of authentic company logos, sending fraudulent emails to employees. Smishing utilizes short text messages tricking people to send their personal information. Cyber stalking entails harassment of a repeated behavior a certain individual engages in most frequently. Cyber stalkers do send threatening messages. Most of the messages are automated at regular intervals. Most victims of the act are women. Cyber stalkers have a desire to exert control over the victims they coerce. Men consist of the largest percentage of the population involved in cyber stalking. The accessibility to personal information is quite accessible especially in the social media, and a cyber-stalker can just access and utilize it. Research has indicated that cyber stalking may even rise to great heights, with the increasing utilization of computers to run the daily errands (Dhillon and Moores, pg. 720). In the industrial and business sector, industrial espionage does utilize illegal mechanisms to have access to trade secrets and competition strategies from other companies they may consider a threat in their thriving in the market. Ex-employees, hackers, and disgruntled employees have the highest tendencies of being involved in such crimes. They can access any information with reference to the products specifications, marketing information and products designs even before they are inaugurated in the markets. Computer hacking is another headache to many companies and visionaries of computer technologies. The pioneers of the computer industry were involved in creating programs that no one person could foresee. They could build up small applications to come up with great operating systems. A strong sense of curiosity always drives the hackers in creating such programs. Hackers can utilize their great expertise to log into private systems and access information in an illegal manner. Other good hackers infiltrate the company’s loopholes and ultimately act as great security advisors. Created laws to address Computer Crimes The computers have ushered in an era of revolution, bringing up instant changes in business and communication fields. However, the recent times have seen an upsurge in computer crimes. Despite the sudden rise in the crimes, the Federal Government has not been responsive enough in coming up with computer crime laws to counteract the rising cases. However, there are a few laws that have been put in place to prosecute the victims of such crimes. The Computer Fraud and Abuse Act states that utilization of harmful computer codes is illegal if the aim of code dissemination is to bring damage or economic loss. If the victim is convicted of the same crime, he or she does risks facing a fine of close to 250 $ and 20 years imprisonment. Access to computers without authorization, any trafficking of passwords with a goal of destruction can deem one immediate prosecution with reference to this Act. The Economic Espionage Act came into being in 1986. It brings into condemnation sharing of trading secrets both locally and internationally. It is illegal for a person to download, take, possess or receive secret information prior to authorization by the owner. In addition, the Wire Fraud Act illegalizes the act of using interstate communication systems to commit fraud or obtain any property. Any theft aided by a computer is also termed as illegal (Carucci, Overhuls, and Soares, pg. 390). Additionally, the United States of America Patriot Act makes a clear definition of cyber terrorism and their penalties. Managing Computer Crime Issue Prevention is better than cure. It is worth remaining safe from loss of information and data through preventive measures. One needs to be aware of the existence of such cybercrimes when making important decisions regarding utilization of information systems at any one time. To ensure a virus fails to harm through email, it is important to take extra caution when opening an email or attachment from any unknown sender. The best action is to delete and discard the message. An antivirus software should always be updated to prevent and detect any malwares. With reference to Phishing, one should always report any information of attempted attack to the financial institution involved. Changing of passwords to the spoofed sites is also vital. To prevent stalking, one should not share personal information in non-secure sites such as social sites. If a person becomes hostile while online, it is wise to log off and surf somewhere else. Blocking a person and filtering the messages also saves a great deal. Reporting to the Internet Service Provider is useful, as the providers do pose policies prohibiting any form of abuse. Moreover, all companies ought to secure reliable hardware that is not a subject to hackers. Continuous monitoring, assessment and evaluation of the firm’s data form a vital component in security maintenance. All the employees must also be educated on the various ways to prevent the occurrence of an attack (Parker, pg. 122). While shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments. The site should use encryption symbol, in a bid to secure personal information. All phony websites requesting for personal information should be avoided. Strong passwords used to secure access may also go a long way to preventing any person from accessing into the system. In summation, the vicious cycle of discovery never ends. It is all about vulnerability discovery, new products release to curb the vulnerability. The cycle is continuous, but one has to act safe to remain safe. Works cited Carucci, Dominic, David Overhuls, and Nicholas Soares. “Computer Crimes.” Criminal Law Review 48 (2011): p375–419. Print. Dhillon, Gurpreet, and Steve Moores. “Computer Crimes: Theorizing about the Enemy within.” Computers and Security 20 (2001): 715–723. Huang, Xiaomin, Peter Radkowski III, and Peter Roman. “Computer Crimes.” The American Criminal Law Review 44 (2007): 285. Print. Parker, Donn B. Fighting Computer Crime: A New Framework for Protecting Information. N. p., 1998. Print. Schmalleger, F. Crimes of the Internet. N. p., 2008. Print. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“History of Crime and Computer Crime. Traditional Problems. Recognizing Assignment - 1”, n.d.)
History of Crime and Computer Crime. Traditional Problems. Recognizing Assignment - 1. Retrieved from https://studentshare.org/information-technology/1654894-history-of-crime-and-computer-crime-traditional-problems-recognizing-and-defining-computer-crimes-contemporary-crimes-categorizing-computer-crime
(History of Crime and Computer Crime. Traditional Problems. Recognizing Assignment - 1)
History of Crime and Computer Crime. Traditional Problems. Recognizing Assignment - 1. https://studentshare.org/information-technology/1654894-history-of-crime-and-computer-crime-traditional-problems-recognizing-and-defining-computer-crimes-contemporary-crimes-categorizing-computer-crime.
“History of Crime and Computer Crime. Traditional Problems. Recognizing Assignment - 1”, n.d. https://studentshare.org/information-technology/1654894-history-of-crime-and-computer-crime-traditional-problems-recognizing-and-defining-computer-crimes-contemporary-crimes-categorizing-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crimes Categories

Internet Crimes

This paper ''Internet crimes'' has explores issues regarding internet crime, where this discussion was based on three dimensions; in this case, internet crime has been explored in terms its effects on the government.... nbsp;The other section covered internet crimes perpetrated against companies and businesses.... Dealing with Internet crimes 7 B.... Personal Computers as Target of Internet crimes 8 V.... Conclusion 9 References 10 Internet crimes I....
7 Pages (1750 words) Literature review

What constitutes a crime Understanding the various Acts that Constitute a Crime with Examples

In general, ordinary crimes can be further divided into two categories personal and property crimes.... The discussion covers the key types of crimes, the acts through which a particular crime gets established and relevant examples to explain the general actions that suddenly become immoral acts.... One of the most common crimes executed in white collar crimes is mail and wire fraud.... … Understanding the various Acts that Constitute a Crime with Examples crimes and all the actions which result in the unlawful act are explained in detail in the following paper....
5 Pages (1250 words) Essay

Crime In The Digital Sphere

These crimes can be classified as computer crimes also referred to cyber crimes.... here are various manifestations of computer crimes that use different forms.... The categories of computer crimes are based on the object of the crime.... hellip; crimes that are done against person affect the different aspects of personality such as the pornography and distribution of offensive materials through the internet and e-mails.... ueComputer Crime DefinedDue to the rapidly developing state of technology in the present society, crimes can take a variety of forms....
7 Pages (1750 words) Case Study

Hacking Exposed, Underlying Motivation

?· Based on the six categories of hackers presented in your textbook on page 93, how would you categorize the hacker in your case?... unishmentDue to the tender age of James, at 16, when he was sentenced for the crimes committed, what could have been a 10 year sentence of incarceration for an adult for the crime, he was only restricted from using the computer and was on house arrest with clear probation.... The US Legal define computer hacking as “intentionally accesses a computer… 1)....
2 Pages (500 words) Essay

E-commerce and IT Industry

However, there is also an increase in the utilisation of computers by individual criminals and terrorist organisations, This has All these constitute cyber crimes.... Cyber crime make the understanding of e-security, related business risks, and how to be protected from such crimes a great necessity for all organisations and individual users to avoid being victims of such crimes.... It is the duty of the management of an organisation to protect their company from cyber crimes through the control of the use of its networks and computer systems....
11 Pages (2750 words) Essay

Types and Fighting of Cyber Crimes

Types of Cyber crimesCyber crimes come in three categories: cyber crimes against a person, property or a government.... Cyber crimes have created attention in the various national capitals.... According to Great Britain: home Office (2010), “the challenge posed by crimes initiated or committed through Cyber Crime Barbara Howard-Shump ITS 1000 computer and Internet Literacy May 12, Wendy Lamont South online Cyber Crime A Cyber crimeis the illegal activities such as credit card fraud, software piracy, among others that are carried out over the internet to offend people's senses or even evade privacy....
2 Pages (500 words) Research Paper

Cybercrime, Privacy, and Security Concepts in the Film WarGames

Therefore, WarGames (1983) is a fictional film narration presenting various categories of computer and network crimes such as cybercrime, privacy violations, and breach of security systems.... This movie review "Cybercrime, Privacy, and Security Concepts in the Film WarGames" presents one of the films depicting IT/computer networks narrative position, which involves hacking of security systems by a teenager and his accomplices to benefit themselves out of the networks violations....
8 Pages (2000 words) Movie Review

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The other thing that the definition of computer crimes may not be able to highlight is the application that is used in committing an offense or the type of computer hat as used.... Different individuals, organization, and nations define computer crimes differently, hence making it definition to be flexible.... Given these factors then will have to define computer crimes through the meanings of hacking, software piracy, and phreaking.... The essay "Computer Crime and the Measures That Can Curb the crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us