Analysis of Computer Crimes

117 views 2 pages ~ 406 words Print

With the fast advancement in technology, life is becoming easier and more comfortable each day. The internet and computers have made the world a global village. It has been made possible to interact with friends, buy goods and services from across the globe. Even so, all these benefits come with a significant share of negativities associated with the internet (Baiden). This research paper seeks to identify the major computer crimes.

HACKING

In this type of crime, a hacker, usually a person with superior computer skills gains unauthorized access to other any computer irrespective of the owner or location. It could be individual, organizations or government computers which puts private information at the risk of exposure.

CYBERBULLYING AND STALKING

This one occurs when a criminal deliberately for unknown reasons targets a person or a group of people and sends them illegal and threatening messages online. The aim is to make the life of the target miserable.

EMAIL BOMBING

Email bombing is a technique used by computer criminals to crash a server or an email address. They do so by sending a large number of emails to the target address.

SPAMMING

Spam or junk mails are used by computer criminals to install malware on a computer without the knowledge of the user. Just by clicking on web links from the spam mail, you become a victim.

DENIAL OF SERVICE ATTACK

This crime targets the server of a website and sends a large number of requests. When the maximum bandwidth of the website is reached, it goes down and sometimes is unavailable. Genuine users of the website are locked out and denied the services.

IDENTITY THEFT

This crime involves collecting a person’s identity such as credit card information, bank details among others through phishing activities. The information is either sold or used by the hacker to masquerade as the legitimate owner of the details.

DATA DIDDLING

Data diddling involves sending virus programs to target computers. The virus illegally alters the data the user enters into the system rendering it useless.

CONCLUSION

Given the rise of cyber-attacks, it is important to always keep safe by avoiding unknown sites that may compromise the safety of your computer and privacy of your information (Lee).

Works Cited

Baiden, John E. “Cyber Crimes”. SSRN Electronic Journal, 2011. Elsevier BV, doi:10.2139/ssrn.1873271.

Lee, Marc. “Cyber Crimes: Preparing To Fight Insider Threats”. Computer Fraud & Security, vol 2012, no. 6, 2012, pp. 14-15. Elsevier BV, doi:10.1016/s1361-3723(12)70063-5.

September 04, 2023
Subject area:

Cyber Crime Internet

Number of pages

2

Number of words

406

Downloads:

43

Writer #

Rate:

4.7

Expertise Internet
Verified writer

Love the way Robbe works with legal papers. As a Law student, I had to deliver four different case study assignments. If you are in trouble, just get in touch with Robbe, and he will get things fixed for you!

Hire Writer

Use this essay example as a template for assignments, a source of information, and to borrow arguments and ideas for your paper. Remember, it is publicly available to other students and search engines, so direct copying may result in plagiarism.

Eliminate the stress of research and writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro