In our modern society where technology is evolving, the people who are exposed to computers each day are also increasing. Using computers have become part of our daily lives to the extent that the world would not function as it would now without the use of computers. With that, criminals are moving on to using computers for their criminal activities and thus computer crimes are born.
Every now and then we will hear news of companies getting hacked, government websites being defaced, customers’ information being leaked out and other various computer crimes all over the world.
This report aims to introduce the various types of computer crimes and what impact does computer ...view middle of the document...
Nowadays, computer crimes have become a serious threat in the society as computer criminals utilize their knowledge to steal, deceive and exploit others to gain benefits easily. Unlike normal crimes, computer crimes can be initiated in a remote location where the law is not enforced for computer crimes and with many computers getting networked to each other, computer crimes have been made easier.
2.2 Various types of computer crime
There are many various types of computer crimes and they have grown huge in numbers ever since more people have access to computers. In this section, it will focus on the more common types of computer crimes that have been prosecuted by law such as Hacking, Theft, Cyberstalking, Identity Theft and usage of malicious softwares.
Hacking is a type of computer crime where a hacker gains unauthorized access to another computer to access personal or sensitive information and sometimes also to destroy or modify information in the computer. As technology is constantly improving over time, the knowledge of computers gained by people is also improving over time and thus leading hackers to exploit security vulnerabilities in computers to benefit themselves or bring havoc to a certain party. Many people are still not conscious of their computer usage habits which make it an easy target for hackers as an unsuspecting user can execute a malicious software unknowingly which can allow a hacker can exploit and gain access to the computer system.
2.2.2 Theft (Piracy)
Theft or piracy is a computer crime where a user violates copyrights of a material by illegally downloading them. With more computers having networking capabilities, it makes it easier for unauthorized sharing or copying of copyrighted material to be carried out. There are also many peer-to-peer downloading or file hosting websites that are hosting these pirated files which encourages and make pirating copyrighted materials easy.
Cyberstalking make use of computers and the internet to stalk or harass someone. Cyberstalking criminals usually start in online chatrooms targeting an individual or by getting their information via social networking websites. The criminal then will then use these information to perform activities such as Identity Theft, harassment, blackmailing or even solicitation for sex.
2.2.4 Identity Theft
Identity Theft is a computer crime which involves obtaining personal or sensitive information from an individual or a company. Phishing, scams, dumpster diving and other computer frauds are commonly led to identity theft where information obtain from such activities can be used for an identity theft crime where criminals can make use of banking information for monetary gains or even for committing a fraud using the obtained data.
2.2 Various types of computer crime
2.2.5 Usage of Malicious Software
Malicious Software refers to any software that can bring harm to the user’s computer or are...