Categories Of Computer Crimes Essay

1277 words - 5 pages

CATEGORIES OF COMPUTER CRIMESThe purpose of this paper is to cover the four common computer crime categories with examples, state which computer crime category we see as posing the greatest threat, and finally to discuss what U.S. government, courts and law enforcement agencies can do to better protect against that threat. Starting with the basis of this paper, the four common computer crime categories are: computers as a target, computers as an instrument of a crime, computers as incidental to crime, and crimes associated with the prevalence of computers.The first computer crime category is computers as the target. During this crime, the attacker attempts to deny a computer's authorized user and/or owner from services which the user would typically freely have access to. Another aspect of this crime category is when a cyber criminal alters data the computer's owner feels is privately safeguarded. One of the most well known examples of this category took place on February 7, 2000; when the Yahoo! website was attacked and shut down for over two and a half hours, causing the public a denial of service from the popular site. (Grice, 2000)The next category of computer crimes is when a computer is the instrument for a crime. This is when cyber criminals use a computer to access a network or computer system with the intent to commit online theft, fraud, exploitation, or threaten and/or harassment. This crime is often done maliciously and with a specific purpose in mind. There is a website available to internet users to assist them if they feel they are a victim of online harassment. This site titled "Working to Halt Online Abuse", for which they use the acronym WHO@, helps people with tips of what they should do in they are the victim of harassment; steps such as tell the harasser to stop, save all information and correspondence you have received, who you can notify depending on the circumstances of your harassment, and what results can be expected. (Working on Halting Online Abuse, 2012)Third is a computer as incidental to a crime. Within this crime category, the computer is not the primary tool used in committing the crime but it is more of an aide used to facility the activity. This category covers such crimes as money laundering, criminal enterprise, or luring victims into compromising situations. There have been reports that cyber criminals have found legal ways to commit illegal activity, money laundering, via use of online games and servers such as Second Life. Second Life providers people the ability to interact with each other around the world; in this game, people make purchases with virtual credits. The criminals will then sell their products, such as real world drugs or virtual credits, for real money, therefore creating a seemingly untraceable exchange of money. (Tsuruoka, 2010)The fourth and final computer crime category is crimes associated with the prevalence of computers. The typical computer users, general consumers and corporate...

Find Another Essay On Categories of Computer Crimes

Computer crime Essay

1239 words - 5 pages Over the last twenty years, a technological revolution has occurred as computers are now an essential element of today's society. Large computers are used to track reservations for the airline industry, process billions of dollars for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People commit computer crimes because of society's

Describe at least three forms of computer crime and outline international and Australian attempts that have been made to regulate them

1773 words - 7 pages The terms "Computer crime," "Computer-related crime," "High-tech crime" and "Cybercrime" are often used interchangeably. A difference can be made between computer specific crimes and traditional crimes performed with the aid of computer technology. Many countries have passed legislation to address computer-related crime. Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws

The Drop in Crime

642 words - 3 pages The Drop in Crime The national crime rate has been dropping for the past several years. Over a 38% drop has been reported since 1993. The drop in the crime rate of America is mainly because of three top reasons. These reasons include the involvement of the community, the offenders of small crimes are being interrogated to come up with leads of larger crimes, and the new computer technology available today. Many citizens have

Cyber Criminals

669 words - 3 pages Cyber Criminals The link between technology and crime has always been fairly close. Criminals find new ways to commit crimes with the advances of technology, while law enforcement quickly utilizes this technology to counteract with cybercriminals. Over time technology advances and with it new behavior patterns form and it is certain that the crimes of today will be different tomorrow. The definition of a cybercrime is any crime that involves a

Computer Crime Investigations Forensics Research

546 words - 2 pages and purpose is, "basic categories of evidence established: live versus dead systems; logical versus physical analysis; the dispersal of evidence over networks; the complications from encryption, data fragmentation, steganography which refers to the practice of concealing a text message inside another file, usually a photograph, anonymity; the importance of procedures and protocols. Unlike some other pontificators about computer investigations

Computer Crime

3116 words - 12 pages ;…………………..22. Briefly history of computer crime ………………………………..……..34. Categories of computer crimes ………...………………………………..4Hackers in cyber world:………………&hellip

The Role of Federal Agencies in Fighting Digital Crime

834 words - 4 pages The Secret Service, FBI, Department of Homeland Security, and other law enforcement agencies have similar challenges when fighting computer crimes and terrorism due to the recent development of computer technologies as well as constant threats. Federal law enforcement agencies and local law enforcement agencies have different responsibilities that work independently instead of on the same level, which can make it difficult to coordinate and

Protection of Information: One of the Internet Security topics

1656 words - 7 pages crimesa. DefinitionThe development of computer technology and its wide use have lead to appearance and spread of computer crimes. Such situation causes alarm among those organizations and legislative institutions that use computer technologies and, of course, people, who use new informational services at homes.The term "computer crime" was first used in the early 70s. However, the discussions concerning it are still actual. The top question of these

Introduction to Computer Crime

2785 words - 12 pages 1.0 Introduction In our modern society where technology is evolving, the people who are exposed to computers each day are also increasing. Using computers have become part of our daily lives to the extent that the world would not function as it would now without the use of computers. With that, criminals are moving on to using computers for their criminal activities and thus computer crimes are born. Every now and then we will hear news of

Computer Secutity and the law

4468 words - 18 pages computer crime into three categories: 1) Computer abuse, 'the broad range of international acts involving a computer where one or more perpetrators made or could have made gain and one or victims suffered or could have suffered a loss.' Computer crime, 'Illegal computer abuse the implies direct involvement of computers in committing a crime. 3) Computer related crimes 'Any illegal act for which a knowledge of computer technology is essential for

Cyber Crimes Reflected Through Television Programs

1058 words - 5 pages Cyber Crimes Reflected Through Television Programs Cybercrimes are a culture which has facilitated technological criminal efforts to undermine government and private organizations in order to create disruption and panic on a large scale. Today’s television programming takes a series of intelligence type action roles, which prove the impact of post 9/11. Computer crimes have increased nationwide fears. The television series 24 is an action drama

Similar Essays

What Is Crime? Definitions And Categories Of Crimes Discussed

1303 words - 5 pages race. There are an incredible amount of crimes which take place each day within the United States, all of which should be preventable by some means. By breaking down each crime into categories, such as ethnicity, one can get a better understanding of which people are committing which crimes. Looking at the data statistically is an excellent way to figure all of this out. While looking at the statistics one may be able to conclude that whites commit

The Computer Criminal Computer Crimes And A Brief Story Of Kevin David Mitnick. Include Details Of His Parole And Intermediate Punishment Sentence. Fully Cited. Includes References

4223 words - 17 pages chores to be completed. Mitnick met regularly with his parole officer who saw he had an addiction with computer crimes and computer hacking as something similar to gambling. "For Kevin, there was an adrenalin rush, and almost physiological charge. When he is in action, he isn't depressed." (Goodell, 1996). His sentence included six months of counseling similar to the treatment of alcoholics and drug addicts (Klein, 1989). At times Kevin struggled

Computer Crimes Need To Be Prevented And Halted Through Increased Computer Network Security Measures As Well As Tougher Laws And Enforcement Of Those Laws In Cyberspace

3335 words - 13 pages embezzlements that might occur over long periods of time, or when a computer operator uses a computer to steal valuable information from an employer.Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within

Computer Crimes Essay

1101 words - 4 pages call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime. None of these categories are exclusive and many activities can be characterized as falling in one or more category. Even though it states that the computer crime is when something takes place when the computer or network is a necessary part of the crime, there are some terms that are used to include traditional crimes. Some of the