Monday, August 1, 2011

Types of Computer Crimes

Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical information. Computer crimes involve activities of software theft, wherein the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have necessitated the introduction and use of newer and more effective security measures.

Types of Computer Crimes

Hacking - The activity of breaking into a computer system to gain an unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. The unauthorized revelation of passwords with intent to gain an unauthorized access to the private communication of an organization of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities.

Phishing -  Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.

Computer Viruses -  Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users. Viruses spread to other computers through network file system, through the network, Internet or by the means of removable devices like USB drives and CDs. Computer viruses are after all, forms of malicious codes written with an aim to harm a computer system and destroy information. Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data.

Cyberstalking -  The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyberstalking activities. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. Obscene emails, abusive phone calls and other such serious effects of cyberstalking have made it a type of computer crime.

Identity Theft -  This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Financial identity theft involves the use of a false identity to obtain goods and services and a commercial identity theft is the using of someone else’s business name or credit card details for commercial purposes. Identity cloning is the use of another user's information to pose as a false user. Illegal migration, terrorism and blackmail are often made possible by means of identity theft.


It’s natural that you’d want to avoid being such a victim, and there are a number of things you can do to protect yourself and your family. Let’s take a look at the top five computer crimes out there, and what you can do to help keep yourself safe.

Malware

Let’s begin with the obvious, shall we? If you use a computer, you’re vulnerable to malware. And if you’re vulnerable to malware, you’re enabling crime on a mass scale.
Malware, as I’m sure you’re aware, refers to viruses, Trojans worms and other software that gets onto your computer without you being aware it’s there. Back in the early part of the century, most such software’s primary aim was thrill. The people writing the software found it amusing to write a program that exploited security flaws just to see how far it could spread.
Today the incentive for making such software is generally more sinister and the reason it makes the list of the top five computer crimes. In some cases a piece of malware will pretend to be a legitimate piece of software, and will ask you for money to remove it

Cyberstalking

People leave a lot of information about themselves online. Such information can leave you vulnerable to cyberstalking, a term that essentially refers to using the Internet to stalk someone in the traditional sense.
Cyber stalking is essentially using the Internet to repeatedly harass another person. This harassment could be sexual in nature, or it could have other motivations including anger or outright hostility.

Child Pornography

It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people make money doing this.
Your child being exploited in this way is extremely unlikely, but that doesn’t mean it’s not worth trying to protect them. Do the ff.
1. Install and use parental control software on all computers.
2. Know what sites your children frequent and monitor their online activity.
3. Foster communication with your children so they understand the potential dangers they may be exposed to online.


Helpful Links
 =============================================
 Cheapest Hosting Plan at Hostbig          
 Latest Movie Preview                                     
 =============================================




“Related Topics”

==================================================

What do You Need with a Wireless Router?

Why Does My Router lose My Laptop?

How to Extend a Wireless Repeater

How to Extend a Laptop’s Wireless Pickup Distance?

My Wireless Adapter keeps Disabling

Why Do I keep Losing My Connection on a Wireless Adapter?

How to Determine the Location of a Wireless Client

How to Network two Computers Via Wireless Router

What Kind of Wireless Router Do I need for Desktop Computers?

How to Make Windows XP Download Files Faster

How to Reconfigure Windows XP to Download Faster

How to Delete Your Browser’s History

How to Increase Download Speed

How to Choose a Laptop or Notebook Computer

How to Calculate Laptop Depreciation

How long should a Laptop Last?

How to Preserve Notebook Battery Life

How Long should Laptop Computer Batteries Last

How to Recover Laptop Battery Life

How to Increase a Laptop Battery’s Life Span

How to Set up a Belkin Wireless G MIMO Router

Why Do I Need a Router & Adapter for Wireless

How to Connect a Desktop Computer to a Wireless System

How to Connect a Desktop to Wireless Internet

How to Connect a PC Via Wireless to the Internet

How to Convert Desktop to Accept Wireless Internet

How to Get Wireless Internet for Desktop PC

How to Boost the Download Speed for Windows XP

How to Clean Notebook Battery Contacts

How to Clean Print Cartridge Contacts

How to Clean Electronic PC Board Contacts

How to Keep My PC Clean

How to Take Care your Computer

How to Remove Potting Material from a PC Board

How to Clean a Circuits Board

How to Clean PC Boards

Computer Crime

Computer Crime Cases

Types of Computer Crimes

History of Computer

What is a Computer

Where to Buy Cheapest Modem

Where to Buy Cheapest Internet Connection

Where to Find Internet Signal

How to Install Internet in Desktop

What is the Best Brand of Keyboard

What is the Best Brand of Mouse

What is the Best Brand of Laptop

How to Install Cable Internet

How to Install Network Interface Card in Desktop Computer

What is Computer Hardware

Which is Better Wireless or Wired Internet

Wide Area Network Software

WAN Versus LAN

How to Network Computer in Home

How to Install Internet in Desktop

Where to Find Internet Signal

How to Install Wireless Internet on a Desktop

How to Surf the Web on Your TV

Which is Better Yahoo Messenger or MSN Messenger

What is the Best Brand of RJ-45

How to Surf the Internet Using Cellphone

What Do I need to Connect Wireless Internet?

How to Install Microsoft Office

How to Install Microsoft Word

How to Install Windows 95

How to Install Windows Vista

How to Uninstall Windows XP

Which is Better Laptop or Desktop

Best Laptop Brand

How to Surf the Internet Using Broadband

How to Install Internet in Laptop

What is the Best Brand of Modem

Wide Area Network Installation

How to Remove Undeleted Files

How to use RJ-45

How to Surf the Internet Worldwide

How to Uninstall Internet Explorer

How to Install Anti-Virus

How to Install Internet Explorer

How to Surf the Internet

How to Install Windows XP

How to Select Best Computers

The Best Brand of Computer

How to Install Firefox

Which is Good Operating System

How To Install Windows ME

How to Reformat Hard disk

How to Install Windows 98

How to Install Linux

How to Format a Computer


==================================================



No comments:

Post a Comment