StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Categories of Computer Crime - Essay Example

Cite this document
Summary
Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Categories of Computer Crime
Read Text Preview

Extract of sample "Categories of Computer Crime"

Running Head: COMPUTER CRIMES Categories of Computer Crimes School Computer Crimes Modern information technology, such as the internet has initiated new forms of crimes and made perpetration of old felonies effortless. Computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights. Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files.

The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records. Today, the biggest crime created through computer use is the electronic financial account transfer (Computer-Based Crime, 2011). Identity TheftTo date, identity theft has the fastest growing crime rate in America.

Identity theft is the pilfering and illegal use of private information from an unsuspecting individual to access personal financial accounts. The targeted personal data include a victim’s address, birth date, telephone number, social security number (SSN), bank account number, credit card number, or other valuable identification records to be used for the thief’s economic gain. Criminals use this information in opening new credit and depository accounts, applying for home or car loans, leasing homes, apartments or vehicles (Brody, Mulig & Kimball, 2007) applying for benefits, or filing fake tax returns (Palmer, 2006).

In worst cases, perpetrators use the obtained private information to take over the victim’s identity, create enormous debts, or use in a criminal activity under the victim’s name (Brody, Mulig & Kimball, 2007).Phishing ScamPhishing is a scam that uses volumes of electronic mail messages to attract innocent victims into disclosing private information. A phishing email illustrating a believable problem lures the victim to a fake link that is a replication of the victim’s bank web address; the victim then fixes the imaginary concern and verifies account information and divulges personal identification.

Subsequently, the phisher uses the pilfered PIN number, secret code, and identity to drain the victim’s bank account (Brody, Mulig & Kimball, 2007).Pharming ScamPharming is a technically higher form of phishing wherein a virus is unknowingly downloaded on the victim’s computer. The prey keys in a genuine web address but is instead redirected to a mock site. The pharmer then steals the financial account number, password, or other valuable information supplied at the phony web site (ID thieves preying on consumers with new phishing scam called pharming, 2005).

Although the preferred web address is shown on the screen, in reality, the domain server system has forwarded the internet traffic to a mere replication of the desired location (Biersdorfer, 2005).CyberterrorismCyberterrorism is the union of computers, internet and terrorism. In general, it is the unauthorized attack and risk against computers, networks, and the stored informationpurposely executed to threaten or force a government, a nation or its people to advance one’spolitical or social intentions.

Cyberterrorist attacks demonstrate power and aggressively threaten or harm persons or property. A perfect example of cyberterrorism is the execution of the September 11 attack on the World Trade Center (Denning, 2000).Protective Measures in the Prevention and Mitigation of Computer CrimesComputer Fraud and Abuse Act (CFAA)The Computer Fraud and Abuse Act (CFAA) prohibits the distribution of computer code or placement in the market stream if the purpose is to inflict destruction or financial loss.

The CFAA centers on a codes destruction to computer systems and the accompanying financial losses, and it charges criminal punishments for either intentional or unintentional release of virus into a business computer system (Hackers: Who’s Responsible?, 2011).Identity Theft and Assumption Deterrence Act of 1998 (ITADA)The U.S. Department of Justice acts against identity theft and fraud cases under the 1998 Identity Theft and Assumption Deterrence Act. It prohibits intentional and unauthorized production or transfer of false or stolen identification documents; intentional possession or use of five or more false identification documents; intentional, production, transfer and possession of a document-making equipment that can make false documents; unauthorized or intentional use of stolen United States documents; and intentional and unauthorized use of another person’s identification documents to commit unlawful activity (Identity Theft and Assumption Deterrence Act of 1998, 2011).

Cyberterrorism Defense Initiative (CDI)The U.S. counter-action against cyberterrorism is the Cyberterrorism Defense Initiative (CDI) which trains technological workforce and executives who monitor and protect the nations important infrastructures. This program educates all levels of public service, as well as the state and local government, the law enforcement and firefighting departments, the public utility sectors, public safety and health institutions, emergency medical services, and education establishments.

The training programs are granted free to qualified personnel, and are held in accessible and central locations all over the U.S. (Cyberterrorism Defense Initiative, n.d.).ReferencesBiersdorfer, J. D. (2005, November 3). As with phishing, shun pharming. New York Times. Retrieved 12 January 2012 from ProQuest database.Brody, R. G., Mulig, E., & Kimball, V. (2007, September 1). Phishing, Pharming and Identity Theft. Academy of Accounting and Financial Studies Journal. Computer-Based Crime. (2011).

Idea Connection. Retrieved 12 January 2012 from: http://www.ideaconnection.com/solutions/505-Computer-based-crime.htmlCyberterrorism Defense Initiative. (n. d.). Cyberterrorism Center. Retrieved 12 January 2012 from: http://www.cyberterrorismcenter.org/Denning, D. (2000, May 23). Cyberterrorism. Testimony before the Special Oversight Panel of Terrorism Committee on Armed Services, US House of Representatives. Retrieved 12 January 2012 from: http://www.cs.georgetown.edu/~denning/infosec/cyberter ror.

htmlHackers: Who’s Responsible? (2011). WGBH Educational Foundation. Retrieved 12 January2012 from: http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.htmlIdentity Theft and Assumption Deterrence Act of 1998. (2011). National Check Fraud Center. Retrieved 12 January 2012 from: http://www.ckfraud.org/title_18.htmlID thieves preying on consumers with new phishing scam called pharming (2005, October). PRNewswire. Retrieved 12 January 2012 from: http://www.nclnet.org/news/2005/phishing_10132005.

htmPalmer, S. (2006, January 10). IRS warns consumers of e-mail scam. St. Petersburg Times. Retrieved 12 January 2012 from ProQuest database.

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1587488-categories-of-computer-crime
(Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 Words)
Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1587488-categories-of-computer-crime.
“Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1587488-categories-of-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Categories of Computer Crime

Emerging Technologies

The Advantages of Computers/Software and the Use of computer Technology in Investigations Emergence of advanced technologies in the form of computers/software and other related technologies can be viewed to provide significant benefits to the overall investigation process in curbing the increased rate of criminal activities.... It has been apparently observed that there are extensive figures of computer software such as Norton Antivirus that are broadly used in investigations....
3 Pages (750 words) Essay

Crime In The Digital Sphere

The categories of computer crimes are based on the object of the crime.... In the age of technological revolution initiated by the rise of computer technology, forms of crime that apply the use of computers are rapidly increasing in occurrence.... here are various manifestations of computer crimes that use different forms.... The paper "crime In The Digital Sphere" discusses how the unprecedented success in the application of the computer and the internet can attract both the legal and illegal application....
7 Pages (1750 words) Case Study

Hacking Exposed, Underlying Motivation

?· Based on the six categories of hackers presented in your textbook on page 93, how would you categorize the hacker in your case?... unishmentDue to the tender age of James, at 16, when he was sentenced for the crimes committed, what could have been a 10 year sentence of incarceration for an adult for the crime, he was only restricted from using the computer and was on house arrest with clear probation.... Ultimately, death was the punishment for his crime....
2 Pages (500 words) Essay

Types and Fighting of Cyber Crimes

Broadhust and Grabosky (2005) in their book defined cyber crime as a “specific category of computer crime, which refers to the use of computers as a tool for crime commission” (p.... A Cyber crime is the illegal activities such as credit card fraud, software piracy, among others that are carried out over the internet to offend people's senses or even evade privacy.... Broadhust and Grabosky (2005) in their book defined cyber crime as a “specific category of… 197)....
2 Pages (500 words) Research Paper

Computer Crimes Categories

here does exist at least four classifications of computer crimes.... The computer can be the crime target, in that there is data alteration hence it cannot provide the expected service.... Secondly, the computer can be an instrument in crime.... In such a case, one uses a computer to participate in a crime.... The crime is most common especially to people who utilize illegal means to solicit funds.... The paper "computer Crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments....
6 Pages (1500 words) Essay

The Issue and Nature of Computer Crimes

Examples of computer crime are: given by (Computer Crime Research Center, 2005) Computer crime has a lot of outlines.... nbsp; computer crime can be defined as “the usage of computers to carry out any criminal proceedings or events” (Parker, 2002) and (Shelly, Cashman, & Vermaat, 2005).... computer crime can also be expressed as “illegal utilization of computer technologies, generally concerning with the Internet, to hold crimes such as deception, theft of identity, sharing of information, and misuse is called computer crime” (computer crime Research Center, 2005)....
8 Pages (2000 words) Essay

Cybercrime, Privacy, and Security Concepts in the Film WarGames

Therefore, WarGames (1983) is a fictional film narration presenting various categories of computer and network crimes such as cybercrime, privacy violations, and breach of security systems.... This practice of hacking into other computer security systems and accessing games to play, instead of purchasing such games from the manufacturers or retailers, is a selfish crime.... This movie review "Cybercrime, Privacy, and Security Concepts in the Film WarGames" presents one of the films depicting IT/computer networks narrative position, which involves hacking of security systems by a teenager and his accomplices to benefit themselves out of the networks violations....
8 Pages (2000 words) Movie Review

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The essay "computer crime and the Measures That Can Curb the Crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not.... he term computer crime is very wide and it may also have a different definition that conveys the term computer crime as an illegal offense that is committed by a computer through a specific individual....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us