Computer Crime
Cybercrime
Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech
crime, computer crime is an act commonly performed by a knowledgeable computer
user, sometimes referred to as a hacker that illegally browses or steals a
company's or individuals private information. In some cases, this person or
group of individuals may be malicious and destroy or otherwise corrupt the
computer or data files.
Examples of
computer crimes
Below is a
listing of the different types of computer crimes today
- Cyber terrorism - Hacking, threats, and blackmailing towards a business or a premeditated use of disruptive activities or the threat thereof against computers and network with intention to cause harm or further social,ideological,religious ,political or similar objective
- Cyberbully or Cyber stalking - Harassing others online.
- Creating Malware-this is a software program that has been intentionally design to change a user’s setting without permission.
- Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.
- Espionage - Spying on a person or business.
- Fraud – this is defined as an act of using the computers internet and internet service to defraud peoples, companies or government agencies of money revenue or internet access.
- Harvesting - Collect account or other account related information on other people.
- Intellectual property theft - Stealing another person’s or companies intellectual property.
- Phishing –is used to describe a malicious individual or a group of individuals scamming users by sending e mails or creating web pages that are designed to collect on individual’s online bank, credits cards, or other login information.
10. Salami
slicing - Stealing tiny amounts of money from each transaction.
11. Spamming
- Distributed unsolicited e-mail to dozens or hundreds of different addresses.
12. Spoofing
- Deceiving a system into thinking you are someone you really are not.
13. Unauthorized
access - Gaining access to systems you have no permission to access.
14. Wiretapping
- Connecting a device to a phone line to listen to conversations.