Thursday, May 14, 2020

Essay on Introduction to Computer Crime - 2441 Words

1.0 Introduction In our modern society where technology is evolving, the people who are exposed to computers each day are also increasing. Using computers have become part of our daily lives to the extent that the world would not function as it would now without the use of computers. With that, criminals are moving on to using computers for their criminal activities and thus computer crimes are born. Every now and then we will hear news of companies getting hacked, government websites being defaced, customers’ information being leaked out and other various computer crimes all over the world. This report aims to introduce the various types of computer crimes and what impact does computer crimes bring to the society. The report will also†¦show more content†¦Unlike normal crimes, computer crimes can be initiated in a remote location where the law is not enforced for computer crimes and with many computers getting networked to each other, computer crimes have been made easier. 2.0 Background 2.2 Various types of computer crime There are many various types of computer crimes and they have grown huge in numbers ever since more people have access to computers. In this section, it will focus on the more common types of computer crimes that have been prosecuted by law such as Hacking, Theft, Cyberstalking, Identity Theft and usage of malicious softwares. 2.2.1 Hacking Hacking is a type of computer crime where a hacker gains unauthorized access to another computer to access personal or sensitive information and sometimes also to destroy or modify information in the computer. As technology is constantly improving over time, the knowledge of computers gained by people is also improving over time and thus leading hackers to exploit security vulnerabilities in computers to benefit themselves or bring havoc to a certain party. Many people are still not conscious of their computer usage habits which make it an easy target for hackers as an unsuspecting user can execute a malicious software unknowingly which can allow a hacker can exploit and gain access to the computer system. 2.2.2 Theft (Piracy) Theft or piracy is a computer crime where a user violates copyrights of a material by illegally downloading them. WithShow MoreRelatedTaking a Look at Cyber Crime680 Words   |  3 PagesIntroduction Cybercrime describe a heinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across theRead MoreComputer Ethics Awareness Among University Students Essay895 Words   |  4 PagesIntroduction 1.1 Background Computers are the core technology of our times and apparently, the most important technology to be invented and used by man . Without computers and computer networks, especially, the Internet, activities of most organizations, such as banks, schools, government agencies would simply grind to a halt. Modern societys dependence on the use of information technology, make it more vulnerable to computer malfunction caused by unreliable software and to computer misuse (ForresterRead MoreComputers in law enforcement 726 Words   |  3 Pagespeople commit criminal activity and there are different solutions to it. Computer is one of the technologies that are used in today’s society mostly by people positively and negatively. This paper will first describe how computers are used in law enforcement. Then, this paper will discover how criminals use this technology and how it causes serious problems for innocent people. Next, this paper will describe how the computer system is or has be en helpful in catching criminals and solving the problemsRead MoreLaw Enforcement and New Technology846 Words   |  4 Pagestechnology, including onboard computers in police vehicles, wireless communication devices, and the Internet, are commonplace. The evolution of policing has been connected through the years with technology. Starting from the days of â€Å"beat cops or bobbies and their runners who helped collect information; the law enforcement branch of the criminal justice system has had an interesting evolution. In today s world, the use of technology assists in this effort. The introduction of technology to Law EnforcementRead MoreComputer Crime Essay846 Words   |  4 PagesRunning head: COMPUTER CRIME Categories of Computer Crime S.R Skolnick Strayer University In todays society computers are used to commit crimes. These crimes are separated into four categories. These categories are as follows, the computer as a target, the computer as an instrument of crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. In example of the computer as a target, is a case of Kevin Mitnick. Kevin Mitnick was once known as theRead MoreTechnology in the Security Field1268 Words   |  6 Pagessafety is the most important aspects in a security setting. The techniques that officers use to ensure security and safety are enhancing through the advancements in technology. Changes have been significant from the time before computers and the current status of high-tech computers and other technology. The changes have brought both positive and negative effects to security settings; however, the changes have been more positive than negative. Creating a safe and secure environment can create a positiveRead MoreComputer Crimes And Computer Crime1066 Words   |  5 Pagescomputer crimes oc/wcc Introduction Ever since computers and networks were invented there have been hackers and computer crimes have grown with the advancement of technology. As with the advancement of technology and computer crimes there have been many types of computer crimes that have evolved with technology. There have been laws in place to help reduce and regulate computers and computer crimes. History of computer crimes Computers and networks became increasingly known and used inRead MoreFour Different Types of Crime1515 Words   |  7 PagesCourse Conover: Dr Hennessey Hayes Tutor: Dr Jacqueline Homel Course Code: CCJ15 Course name: Introduction to Crime and Criminology Assessment number: 1 Due Date: 23.04.10 Extension confirmation number: 14177 Student name: Tamara Chatterton Student number: S2736240 This essay will examine four different types of crime. These include: Property, Violent, White-collar and Internet crimes. To examine these in detail this essay will define and explain each one. It will then describe how they are measuredRead More Computer Crime Essay1055 Words   |  5 Pagesof the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even every child. CHAPTER 1 INTRODUCTION To first understand computer crime one must understand first what crime is. According to Diana Kendall, crime is a behavior that violates criminal law and is punishable with fines, jail or other sanctions (Kendall 1999; 161). Yet since computer technology is so new it has reallyRead MoreCyber Threat, Its Scope And Its Impact On National Security991 Words   |  4 PagesCyberspace which is an offshoot for the development of computer and digital communication technologies, has in recent decades become part and parcel of our daily lives. It has become an ideal source for cyber criminals to remain active while preying on victims. Higher the number of cyberspace users’, higher is the opportunities for exploitation. So it is the need of the hour to protect our computers, networks, digital applications and our data from unintended or unauthorized source, change or destruction

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.