Monday, 29 August 2016

computer crime



Computer Crime
Cybercrime Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-tech crime, computer crime is an act commonly performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individuals private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
Examples of computer crimes
Below is a listing of the different types of computer crimes today
         
  1.                           Cyber terrorism - Hacking, threats, and blackmailing towards a business or a premeditated use of disruptive activities or the threat thereof against computers and network with intention to cause harm or further  social,ideological,religious ,political or similar objective
  2.                       Cyberbully or Cyber stalking - Harassing others online.
  3.          Creating Malware-this is a software program that has been intentionally design to change a             user’s setting without permission.
  4.              Denial of Service attack - Overloading a system with so many requests it cannot serve       normal  requests.
  5.                        Espionage - Spying on a person or business.
  6.                          Fraud – this is defined as an act of using the computers internet and internet service to defraud             peoples, companies or government agencies of money revenue or internet access.
  7.                           Harvesting - Collect account or other account related information on other people.
  8.                          Intellectual property theft - Stealing another person’s or companies intellectual property.
  9.      Phishing –is used to describe a malicious individual or a group of individuals scamming users by sending e mails or creating web pages that are designed to collect on individual’s online bank, credits cards, or other login information.

10.  Salami slicing - Stealing tiny amounts of money from each transaction.
11.  Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
12.  Spoofing - Deceiving a system into thinking you are someone you really are not.
13.  Unauthorized access - Gaining access to systems you have no permission to access.

14.  Wiretapping - Connecting a device to a phone line to listen to conversations.

No comments:

Post a Comment