This website uses cookies to ensure you have the best experience. Learn more

Introduction To Computer Crime Essay

2785 words - 12 pages

1.0 Introduction
In our modern society where technology is evolving, the people who are exposed to computers each day are also increasing. Using computers have become part of our daily lives to the extent that the world would not function as it would now without the use of computers. With that, criminals are moving on to using computers for their criminal activities and thus computer crimes are born.
Every now and then we will hear news of companies getting hacked, government websites being defaced, customers’ information being leaked out and other various computer crimes all over the world.
This report aims to introduce the various types of computer crimes and what impact does computer ...view middle of the document...

Nowadays, computer crimes have become a serious threat in the society as computer criminals utilize their knowledge to steal, deceive and exploit others to gain benefits easily. Unlike normal crimes, computer crimes can be initiated in a remote location where the law is not enforced for computer crimes and with many computers getting networked to each other, computer crimes have been made easier.
2.0 Background
2.2 Various types of computer crime
There are many various types of computer crimes and they have grown huge in numbers ever since more people have access to computers. In this section, it will focus on the more common types of computer crimes that have been prosecuted by law such as Hacking, Theft, Cyberstalking, Identity Theft and usage of malicious softwares.
2.2.1 Hacking
Hacking is a type of computer crime where a hacker gains unauthorized access to another computer to access personal or sensitive information and sometimes also to destroy or modify information in the computer. As technology is constantly improving over time, the knowledge of computers gained by people is also improving over time and thus leading hackers to exploit security vulnerabilities in computers to benefit themselves or bring havoc to a certain party. Many people are still not conscious of their computer usage habits which make it an easy target for hackers as an unsuspecting user can execute a malicious software unknowingly which can allow a hacker can exploit and gain access to the computer system.
2.2.2 Theft (Piracy)
Theft or piracy is a computer crime where a user violates copyrights of a material by illegally downloading them. With more computers having networking capabilities, it makes it easier for unauthorized sharing or copying of copyrighted material to be carried out. There are also many peer-to-peer downloading or file hosting websites that are hosting these pirated files which encourages and make pirating copyrighted materials easy.
2.2.3 Cyberstalking
Cyberstalking make use of computers and the internet to stalk or harass someone. Cyberstalking criminals usually start in online chatrooms targeting an individual or by getting their information via social networking websites. The criminal then will then use these information to perform activities such as Identity Theft, harassment, blackmailing or even solicitation for sex.
2.2.4 Identity Theft
Identity Theft is a computer crime which involves obtaining personal or sensitive information from an individual or a company. Phishing, scams, dumpster diving and other computer frauds are commonly led to identity theft where information obtain from such activities can be used for an identity theft crime where criminals can make use of banking information for monetary gains or even for committing a fraud using the obtained data. 
2.0 Background
2.2 Various types of computer crime
2.2.5 Usage of Malicious Software
Malicious Software refers to any software that can bring harm to the user’s computer or are...

Find Another Essay On Introduction to Computer Crime

Describe at least three forms of computer crime and outline international and Australian attempts that have been made to regulate them

1773 words - 7 pages The terms "Computer crime," "Computer-related crime," "High-tech crime" and "Cybercrime" are often used interchangeably. A difference can be made between computer specific crimes and traditional crimes performed with the aid of computer technology. Many countries have passed legislation to address computer-related crime. Under the Australian system of Government, all Australian States and Territories have a general power to enact criminal laws

Computer Ethics Awareness Among University Students

930 words - 4 pages Introduction 1.1 Background Computers are the core technology of our times and apparently, the most important technology to be invented and used by man . Without computers and computer networks, especially, the Internet, activities of most organizations, such as banks, schools, government agencies would simply grind to a halt. Modern society's dependence on the use of information technology, make it more vulnerable to computer malfunction

Cyber Crime

840 words - 4 pages Introduction Cybercrime describe a heinous act that interferes with the functioning of the computer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages . If American law enforcement officials do not face the problem head on, they will never be able to handle it.References:Britz, Marjie T. (2003). Traditional Problems in Computer Investigations. Computer Forensics and Cyber Crime: An Introduction, 144. New Jersey: Pearson Education, Inc.Hale, Chris. (2002). Cybercrime: Facts & Figures Concerning the Global Dilemma. Crime and Criminal Justice, vol. 18, no.65, pp.5-6, 24-26.Hansen, Brian. (2002

computers in law enforcement

895 words - 4 pages . "Introduction: The Scope of the Topic." In Computer crime in Canada: an introduction to technological crime and related legal issues. Scarborough, Ont.: Carswell, 1997. Online Identity Theft. 2009. Parker, Donn B.. "Introduction." In Crime by computer. New York: Scribner, 1976. Snow, Robert L.. Technology and law enforcement from gumshoe to gamma rays. Westport, CT: Praeger Publishers, 2007.

Crime Mapping in Omaha/Douglas County, Nebraska

898 words - 4 pages mapping will be defined, then specifically looked at for an area which I have chosen, Douglas County, Nebraska. Finally, I will utilize the information found on the crime map data shared to either support or refute a criminological theory which has been discussed thus far in our Criminology class. An Introduction to Crime Maps and Crime Mapping What is a crime map? A crime map is created when analysts can pinpoint the locations of where criminal

Defining White Collar Crime

850 words - 4 pages suits who steal money and don't go to prison and let if go at that. Yet, the overall concept of white collar crime is a complex and inconclusive subject. In this paper, firstly I will discuss briefly the introduction of white collar crime by theorist Edwin Sutherland. Secondly, I will identify the continuing debates about the term white collar crime's scope and meaning. Thirdly, I will discuss the importance of white collar crime within the field of

What is Digital Forensic?

1795 words - 8 pages 1. Introduction The aim of this report is to theoretical cover data preservation, examination of digital evidence, tools and techniques for data capture, preservation and examination with a list of recommendations. In our modern society, computers and other digital devices are becoming ubiquitous. In the late 1970’s the number of crimes that involved digital devices and computers has been increasing rapidly. As a result of that, computer

The History of Crime and Its Evolution

1758 words - 8 pages drug offenders. However, the use of narcotics has fueled drug trafficking and aided in sustaining organized crime and organized groups. To pull the market from under organized groups, rehabilitation, early intervention, and treatment should be implemented to reduce the demand for drugs. Organized crime is a threat to society and global security as activities of such groups change and move toward high-tech crime like money laundering and computer

Computer Crimes

1101 words - 4 pages Computer Crimes Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future. Criminal activity where a computer or network is the source, target, place or tool of a crime is what we

Computers and the Law

2446 words - 10 pages QUESTIONS:- What are computer crimes?- What statutes govern computers use and abuse?- How was computer crimes dealt with in the past?ESSAY:The widespread use of Information Technology has created new opportunities for computer crimes. A computer crime, obviously involves using a computer, can be in the form of hacking, software piracy, planting viruses or storing/distributing inappropriate pornographic images to name just a few. Below and in the

Similar Essays

Introduction To Computer Architecture Essay

1780 words - 7 pages "This essay gives a brief introduction on Computer Architecture"BASIC COMPUTER ARCHITECTUREAddress, Data, and Control Buses:A computer system comprises of a processor, memory, and I/O devices. I/O is used for interfacing with the external world, while memory is the processor's internal world. Processor is the core in this picture and is responsible for performing operations. The operation of a computer can be fairly described with processor and

Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1597 words - 6 pages AbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures of

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1509 words - 6 pages Abstract:With the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

1916 words - 8 pages The vulnerability of computerised accounting information systems to computer crimeAbstractWith the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. CAIS has been used more and more broadly and had as much impact on organisations, however the computer crime is also an important issue related to CAIS. As the