Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical information. Computer crimes involve activities of software theft, wherein the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have necessitated the introduction and use of newer and more effective security measures.
Types of Computer Crimes
Hacking - The activity of breaking into a computer system to gain an unauthorized access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. The unauthorized revelation of passwords with intent to gain an unauthorized access to the private communication of an organization of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking of IP addresses in order to transact with a false identity, thus remaining anonymous while carrying out the criminal activities.
Phishing - Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source. Phishing is carried out through emails or by luring the users to enter personal information through fake websites. Criminals often use websites that have a look and feel of some popular website, which makes the users feel safe to enter their details there.
Computer Viruses - Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users. Viruses spread to other computers through network file system, through the network, Internet or by the means of removable devices like USB drives and CDs. Computer viruses are after all, forms of malicious codes written with an aim to harm a computer system and destroy information. Writing computer viruses is a criminal activity as virus infections can crash computer systems, thereby destroying great amounts of critical data.
Cyberstalking - The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking. False accusations, transmission of threats and damage to data and equipment fall under the class of cyberstalking activities. Cyberstalkers often target the users by means of chat rooms, online forums and social networking websites to gather user information and harass the users on the basis of the information gathered. Obscene emails, abusive phone calls and other such serious effects of cyberstalking have made it a type of computer crime.
Identity Theft - This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity. It is the act of pretending to be someone else by using someone else's identity as one's own. Financial identity theft involves the use of a false identity to obtain goods and services and a commercial identity theft is the using of someone else’s business name or credit card details for commercial purposes. Identity cloning is the use of another user's information to pose as a false user. Illegal migration, terrorism and blackmail are often made possible by means of identity theft.
Malware
Let’s begin with the obvious, shall we? If you use a computer, you’re vulnerable to malware. And if you’re vulnerable to malware, you’re enabling crime on a mass scale.Malware, as I’m sure you’re aware, refers to viruses, Trojans worms and other software that gets onto your computer without you being aware it’s there. Back in the early part of the century, most such software’s primary aim was thrill. The people writing the software found it amusing to write a program that exploited security flaws just to see how far it could spread.
Today the incentive for making such software is generally more sinister and the reason it makes the list of the top five computer crimes. In some cases a piece of malware will pretend to be a legitimate piece of software, and will ask you for money to remove it
Cyberstalking
People leave a lot of information about themselves online. Such information can leave you vulnerable to cyberstalking, a term that essentially refers to using the Internet to stalk someone in the traditional sense.Cyber stalking is essentially using the Internet to repeatedly harass another person. This harassment could be sexual in nature, or it could have other motivations including anger or outright hostility.
Child Pornography
It’s tragic, but the Internet is often used to exploit children. What’s perhaps even sicker is that people make money doing this.Your child being exploited in this way is extremely unlikely, but that doesn’t mean it’s not worth trying to protect them. Do the ff.
1. Install and use parental control software on all computers.
2. Know what sites your children frequent and monitor their online activity.
3. Foster communication with your children so they understand the potential dangers they may be exposed to online.
Helpful Links
=============================================
=============================================
“Related Topics”
==================================================
What do You Need with a Wireless Router?
Why Does My Router lose My Laptop?
How to Extend a Wireless Repeater
How to Extend a Laptop’s Wireless Pickup Distance?
My Wireless Adapter keeps Disabling
Why Do I keep Losing My Connection on a Wireless Adapter?
How to Determine the Location of a Wireless Client
How to Network two Computers Via Wireless Router
What Kind of Wireless Router Do I need for Desktop Computers?
How to Make Windows XP Download Files Faster
How to Reconfigure Windows XP to Download Faster
How to Delete Your Browser’s History
How to Increase Download Speed
How to Choose a Laptop or Notebook Computer
How to Calculate Laptop Depreciation
How long should a Laptop Last?
How to Preserve Notebook Battery Life
How Long should Laptop Computer Batteries Last
How to Recover Laptop Battery Life
How to Increase a Laptop Battery’s Life Span
How to Set up a Belkin Wireless G MIMO Router
Why Do I Need a Router & Adapter for Wireless
How to Connect a Desktop Computer to a Wireless System
How to Connect a Desktop to Wireless Internet
How to Connect a PC Via Wireless to the Internet
How to Convert Desktop to Accept Wireless Internet
How to Get Wireless Internet for Desktop PC
How to Boost the Download Speed for Windows XP
How to Clean Notebook Battery Contacts
How to Clean Print Cartridge Contacts
How to Clean Electronic PC Board Contacts
How to Keep My PC Clean
How to Take Care your Computer
How to Remove Potting Material from a PC Board
How to Clean a Circuits Board
How to Clean PC Boards
Computer Crime
Computer Crime Cases
Types of Computer Crimes
History of Computer
What is a Computer
Where to Buy Cheapest Modem
Where to Buy Cheapest Internet Connection
Where to Find Internet Signal
How to Install Internet in Desktop
What is the Best Brand of Keyboard
What is the Best Brand of Mouse
What is the Best Brand of Laptop
How to Install Cable Internet
How to Install Network Interface Card in Desktop Computer
What is Computer Hardware
Which is Better Wireless or Wired Internet
Wide Area Network Software
WAN Versus LAN
How to Network Computer in Home
How to Install Internet in Desktop
Where to Find Internet Signal
How to Install Wireless Internet on a Desktop
How to Surf the Web on Your TV
Which is Better Yahoo Messenger or MSN Messenger
What is the Best Brand of RJ-45
How to Surf the Internet Using Cellphone
What Do I need to Connect Wireless Internet?
How to Install Microsoft Office
How to Install Microsoft Word
How to Install Windows 95
How to Install Windows Vista
How to Uninstall Windows XP
Which is Better Laptop or Desktop
Best Laptop Brand
How to Surf the Internet Using Broadband
How to Install Internet in Laptop
What is the Best Brand of Modem
Wide Area Network Installation
How to Remove Undeleted Files
How to use RJ-45
How to Surf the Internet Worldwide
How to Uninstall Internet Explorer
How to Install Anti-Virus
How to Install Internet Explorer
How to Surf the Internet
How to Install Windows XP
How to Select Best Computers
The Best Brand of Computer
How to Install Firefox
Which is Good Operating System
How To Install Windows ME
How to Reformat Hard disk
How to Install Windows 98
How to Install Linux
How to Format a Computer
==================================================