Explain in detail the four common categories of computer crimes and provide at least one example for each. There are many different types of computer crime and multiple ways to categorize them. I will discuss four categories in detail to shine light on how vulnerable people are, when we choose to use a personal or publicly used computer to transmit confidential information, conduct business transactions or transfer funds between accounts. Even the most knowledgeable experts on computers are not exempt from being victims of computer crimes.
The Computer as a Target Crime can happen in many different ways. One of the most common areas is the use of the computer. According to Ronald B. Standler, there are three major classes of criminal activity with computers. The first way is unauthorized use of a computer, which might involve stealing a username and password, or might involve accessing the victim’s computer via the Internet through a backdoor, operated by a Trojan Horse program. The second way is creating or releasing a malicious computer program (e. g. , computer virus, worm, Trojan Horse).
The third ways is harassment and stalking in cyberspace. Often time people are not properly educated on how to reduce the risk of becoming a victim of computer crimes. In this day and time we all need to take more responsibility to help protect our personal information when we are using the computer. The Computer as an instrument of the Crime Computer technology can be used to implement plans of action to commit crimes. This type of criminal is labeled as cybercriminal. Cybercriminals may hack into personal financial accounts to access funds.
They might attack website databases in order to gain access to consumer details, such as social security numbers, that can be used to take out credit cards or loans in another person’s name. Also cybercriminals can gain access to individual computers to peek through files, website browsing history, access passwords, or possibly even save files to your machine. This type of fraud is known as computer trespass. This is the type of variability we fall victim to when we are not familiar with how criminal gain assess to our personal information. The Computer as Incidental to a Crime
In this type of crime the computer is not the primary focus, it is simple the tool to gain assess to the main of objective. However, usage of computer while committing a crime increases the efficiency of the crime making it difficult to identify and detect. In this type of crimes, computers help the crime to occur faster and also permit processing of greater amounts of information within a short period of time; such as money laundering, unlawful banking transactions, processing and distribution of pornographic information and encrypting or erasing data files and criminal records.
Crimes Associated with Prevalence of Computer This type of crime is committed simple because a computer is available. The more advance technology become the more tools are provided for cybercriminal. The crimes consist of software piracy, copyright violation of computer programs, manufacturing counterfeit computer equipment and other peripherals such as modems and hard disks and selling of original computer equipment, peripherals and programs at far reduced prices in a black market.
Although the criminal may think or believe he or she is helping their fellow man by selling the merchandise at a lower price but in reality they are hurting the original owner because there sells begin to take a dive due to someone stealing and coping there work and selling it to gain a profit. Determine which of these categories of computer crimes present the greatest overall threat at the present time and why you perceive this to be the case. I believe the greatest threat is the computer incidental crime because these crimse take place simply because a computer is present and the criminal has the knowledge to carry out the task.
This type of crime has the potential to impact our personal and professional lives because in this day and time more and more information is being filter through computer systems. For example; money laundering is illegally obtaining funds that are being transfer by the uses of a computer. Once the criminal has hacked the system they can drain every account they have access to. This is something that can bring billion dollar corporations to there knees and have many people with out jobs, which leads to no income for them to support themselves or their household. We have to be careful with who we trust our information too.
January 9, 2018
Hi there, would you like to get such a paper? How about receiving a customized one?Check it out