StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crimes - Literature review Example

Cite this document
Summary
This review 'Computer Crimes' classifies computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.4% of users find it useful
Computer Crimes
Read Text Preview

Extract of sample "Computer Crimes"

?Running Head: Computer Crimes Computer Crimes Inserts His/her Introduction Computer technology has revolutionized our world in the later part of 20th century. The invention of computer was a great step by mankind but putting a computer in every household has changed our lives today to extent that was unimaginable a few decades ago. Unfortunately like every invention computers too can be used for negative and positive purposes. Because the benefit that computer provides is great, the harm it can cause is also many folds more than pre computer age. Criminals have used computers for criminal activity since its availability was not a problem. Computer crimes or cyber crimes are crimes that are committed through the use of computers. We can classify computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices. These two types of computer crimes have many types and all of them will be elaborated in the paper. Computer Crime that Target Networks or other Computers These types of computer crimes are most important because they are directly related to the invention of computer itself. The creation of computers actually gave birth to such crimes. Other type of computer crimes only use computer and they were being carried out long before computer technology was developed so they have only been increased through computers. But computer crimes that target network are specifically designed to harm or damage systems and networks. Some of these crimes are virus dissemination, worms, denial of service attacks, hacking, Salami attack, credit card theft, electronic funds transfer fraud and spoofing. All of these crimes alongside with their possible damages will be listed below. Virus Dissemination Virus is a program that copies itself and spreads from the host computer to the target computer (Solomon, A. 1995). It is malicious software that attaches itself to other software and then spreads to other computers. Virus attacks are very common and they are usually targeted at networks. Because viruses can multiply they can reduce the speed of your computers. They are attached to programs so when we run programs, viruses run to and in this way they slows the speed of the computers. Viruses can also delete files from a computer system. Actually viruses are custom made so they can do a lot of harm to computers and networks. There are many types of viruses like Worms, Trojan Horses, and Bomb etc. All these viruses use different techniques to harm computers and networks. Worms are similar to viruses but they are separate programs. A virus can be cleaned but in order to remove a worm the file has to be deleted. Trojan Horses are also programs that are disguised as normal programs but when we run them they destroy data and damage computers. Trojan Horses do not self replicate like viruses and worms. An example of the damage that can be caused by a virus is the Melissa Virus of 1999 when Microsoft and large companies had to completely shut down their email systems (Brain, M. 2011). Virus dissemination means to spread viruses from one computer to another in any form. This can harm the computer and corrupt files therefore virus dissemination is included in computer crimes. Viruses serve no useful purpose and are designed to damage computers or networks. They usually delete important files and can cause havoc for companies and households. The spreading power of virus makes them dangerous. Virus dissemination is one of the most common computer crimes of modern technology age. Denial of Service Attacks The Denial of Service Attacks is a computer crime in which attackers flood a particular website or service and prevent legitimate users of the service from using that service (CERT, 2011). Attackers actually flood the service and service is disabled for legitimate users. In Denial of Service attacks many fake requests are sent to the server at the same time and server is kept busy in answering these requests (Cnet News, 2000). These attacks are aimed at disrupting the services of a company or a website. They can cause great harm to e commerce businesses because they rely solely on internet. Hacking Hacking is probably the most dangerous computer crime. It involves entering into a network or a computer illegally and stealing files for financial or other purposes (Erikson, J. 2008). A computer hacker uses many techniques to gain access to a network or a system, and then alters, delete or steal information. In this age of information and technology all organizations and individual keep their data in digital forms therefore hacking incidents are a serious threat to any organization. The incident of Wiki leaks has shocked the world where such important documents were made available to public through hacking (Riley, M. 2011). Hacking can also lead to catastrophe when private information of users is stolen from the servers of large organization. Hacking therefore can be regarded as the greatest threat faced by the world after the invention of computers. Salami Attack Salami Attack is also common computer crimes in which small attacks are carried against a system or a network. Salami Attack involves attacking a computer through many small attacks so that it is not easily traceable (Kumar, A. 2009). A salami technique is also used in financial frauds where frauds of small amounts occur many times. Salami attack through computer can disrupt normal services of an organization. Spoofing Spoofing is also a computer crime in which a person or a program gains access to some data or information by masquerading as the legitimate user (Grantz & Rochester, 2005). Networks are usually prone to such attacks because they require authentication of some sort and attackers can pose himself as another person and then can gain access to the information present on the network. Credit Card and Electronic Transfer Fraud Credit card fraud is also done by using computers. Because of high usage of credit cards on online shopping services online ways have been developed to steal credit card info. There are no signatures involved when using credit card online and that is why hackers find it easy to steal credit card information of customers (Kunz & Wilson, 2004). It is also difficult to trace the criminals involved in credit card fraud through internet. Electronic transfer service is given by almost all the banks and attackers have also developed techniques through which they can hack the bank account information of a person and then can steal his or her money. This fraud is carried out easily through computers because systems have loop holes and they are exploited by hackers (BDO, 2008). Computer Crimes that only use Computers The pre-internet crimes like drug trafficking, stalking, smuggling, robbery and terrorism are also included in computer crimes today because they all use computers in some form or another. Computers have only given criminals a way through which they can carry out these crimes easily than before. The aim here is not to damage a network or another user but to use computer as means to achieve illicit goals. Computer, in such crimes, are used as a means to end. Drug Trafficking Drug trafficking is made a lot easier by internet and computers. Drug traffickers can easily connect with their buyers on the internet and can sell their drugs without physical presence. In this way they are able to hide themselves and carry out drug trades. Internet and computers have also allowed drug traffickers to expand their activities on a global level (Telegraph, 2008). Cyber Stalking Cyber Stalking is also a crime that has grown in today’s age where people are harassed by using different social networks and emails. Individuals or group of individuals are given threats and are blackmailed through computers. This crime is growing especially in teenagers. Cyber stalkers can also hide their identity therefore they find it easy to stalk people through internet. Cyber Terrorism Cyber terrorism joins cyber space and terrorism, and it is a lethal mixture. Cyber terrorism involves computer systems and internet through which attacks are made on a wide group of innocent people (Gordon & Ford, 2011). Terrorist communicate to each other using internet and can locate and see their targets which helps them to plan their attack. Specific information regarding movement of flights and trains can also be found on the internet which is then used to plan the attack. Cyber terrorism is used by terrorists today to propagate their message. They make videos of suicide bombers and this motivates others to become like them. Conclusion Computer technology has provided mankind with a lot of opportunities to explore the world. Positive use of this technology can do wonders in science and other fields but unfortunately computers are also used for criminal purposes. Computer crimes are crimes that either attack other computers of networks or are crimes that use computers as a means to end. Computer crimes that attack networks involve virus dissemination, hacking, denial of service attacks, spoofing and credit card frauds. Computer crimes that are only aided by computer technology include drug trafficking, cyber stalking and cyber terrorism. References Brain, M. (2011). How Computer Viruses Work. How Stuff Works. Retrieved from http://www.howstuffworks.com/virus.htm Denial of Services Attacks. (2011). CERT. Retrieved from http://www.cert.org/tech_tips/denial_of_service.html Electronic Funds Transfer Fraud. (2008). BDO. Retrieved from http://www.bdo.co.za/resources/showitemarticle.asp?ResourceSectionId=4&ResourceSectionName=Publications&ResourceId=11&ResourceName=News%20and%20Views&IssueId=44&ContentPageID=&Archive=&articleid=52 Erikson, J. (2008). HACKING the art of exploitation (2nd edition ed.). San Francisco: No Starch Press Gantz & Rochester. (2005). Pirates of the Digital Millennium. Upper Saddle River, NJ: Prentice Hall. Gordon & Ford. (2011). Cyber Terrorism? Symantec Security Response. Retrieved from http://www.symantec.com/avcenter/reference/cyberterrorism.pdf How a 'denial of service' attack works. (2000).CNET News. Retrieved from http://news.cnet.com/2100-1017-236728.html Internet drug trafficking skyrockets, experts warn. (2008). The Telegraph. Retrieved from http://www.telegraph.co.uk/news/worldnews/2779644/Internet-drug-trafficking-skyrockets-experts-warn.html Kumar, A. (2009). Cyber Law. Bangalore: YFI Kunz & Wilson. (2004). Computer Crime and Computer Fraud, Montgomery County Criminal Justice Coordinating Commission. Retrieved from http://www.montgomerycountymd.gov/content/cjcc/pdf/computer_crime_study.pdf Riley, M. (2011). Is Wiki Leaks Hacking for Secrets? Bloomberg Business Week. Retrieved from http://www.businessweek.com/magazine/content/11_07/b4215046290051.htm Solomon, A. (1995). All about Viruses. Retrieved from http://vx.netlux.org/lib/aas10.html Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Hacking/Cracking - Is it Ever Ethical Research Paper”, n.d.)
Retrieved from https://studentshare.org/information-technology/1427534-hacking-cracking-is-it-ever-ethical
(Hacking/Cracking - Is It Ever Ethical Research Paper)
https://studentshare.org/information-technology/1427534-hacking-cracking-is-it-ever-ethical.
“Hacking/Cracking - Is It Ever Ethical Research Paper”, n.d. https://studentshare.org/information-technology/1427534-hacking-cracking-is-it-ever-ethical.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crimes

Phishing Computer Crimes

PHISHING Computer Crimes Phishing Computer Crimes Author Author's Affiliation Date With the passage of time, huge developments have been done in the field of computer science.... ?? Additionally, the Computer Crimes appear in a wide variety of ways and also cause a number of serious problems for different people.... In addition, Hacker and Cracker are most widely used terms in Computer Crimes.... Also, the company should hire trustworthy personnel to minimize crimes related to computers (Parker, 2002; Worthington, 2003, pp....
4 Pages (1000 words) Research Paper

Keylogger scam. Computer crimes

This paper entails the types of Computer Crimes existing in our society, technological safeguards available and examples of frauds that have practically occurred in past.... Computer Crimes Computer Crimes are against social morals and ethical norms since they are aimed at causing harm to an individual financially or otherwise.... Modern times of technology and virtual networking have given birth to another level of fraudulent crimes being committed across the globe....
3 Pages (750 words) Book Report/Review

Computer Crimes in the USA

In the paper “Computer Crimes in the USA” the author analyzes cyber crimes, which have assumed frightening proportions throughout the world.... Especially, the developing world is more prone to becoming a hotbed of Computer Crimes as the law enforcement agencies there are bereft of the requisite training.... In the absence of such intimidating technological deterrents, Computer Crimes are thriving and proliferating like never before....
8 Pages (2000 words) Article

The history of computer crimes

Since the dawn of the computer and technological age, Computer Crimes have evolved just as intricately and as surely as the advancements and upgrades in computer technology.... hellip; This paper shall trace the evolution of Computer Crimes, from the simpler age of computer technology to the present age of globalization and modernization. From the 1960s to the 1970s, most Computer Crimes In 1969, a student riot in Canadian school building resulted to damages totaling around $2 million....
5 Pages (1250 words) Term Paper

Computer Crimes -Sonys PlayStation Network

 This study "Computer Crimes -Sony's PlayStation Network" discusses how Sony Corporation handled the hacking issue including identifying the breach, system downtime, compensation to the users, action taken against the hacker.... hellip; In the midst of overarching technological evolution, Computer Crimes have become overwhelming.... One of the historical Computer Crimes targeted Sony's PlayStation Network.... nbsp;computer crime entails unauthorized use of computer-based technology to access, view, manipulate, share, or steal information from unsuspecting owners....
1 Pages (250 words) Case Study

Investigating High-Technology Computer Crimes

As the paper outlines, Computer Crimes, or cybercrimes, are a crime that is conducted on computers and computer networks as aids to attack or targets of attacks.... Data from the Bureau of Justice Assistance shows a general trend in increasing incidence of Computer Crimes over the past decade.... The decision by the Attorney General's to establish computer crime as a priority for the justice agency also means that the crime is becoming more significant than other types of crimes (Offices of the United States Attorneys, n....
1 Pages (250 words) Essay

Computer Crimes Categories

The paper "Computer Crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments.... here does exist at least four classifications of Computer Crimes.... Primarily, cybercrime does utilize the computer to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft.... On the other hand, the prevalence of computers can be associated with crimes....
6 Pages (1500 words) Essay

Computer Crimes and Digital Investigations

This paper "Computer Crimes and Digital Investigations" focuses on the fact that the Internet, along with other telecommunications marvels, has turned the world into a global village.... nbsp;… The following unlawful activities are conducted using the computer, for example, cyber defamation, e-mail spoofing, pornography, forgery, financial crimes, intellectual property crime, a sale of illegal articles, online gambling, and cyberstalking.... In the wrong hands, it will facilitate the commission of all traditional criminal activities and generate a whole new series of criminal activities called “cyber crimes”, which the world may be ill-equipped to cope with if the problem is not squeezed in the beginning....
12 Pages (3000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us