Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
With the fast advancement in technology, life is becoming easier and more comfortable each day. The internet and computers have made the world a global village. It has been made possible to interact with friends, buy goods and services from across the globe. Even so, all these benefits come with a significant share of negativities associated with the internet (Baiden). This research paper seeks to identify the major computer crimes.
HACKING
In this type of crime, a hacker, usually a person with superior computer skills gains unauthorized access to other any computer irrespective of the owner or location. It could be individual, organizations or government computers which puts private information at the risk of exposure.
CYBERBULLYING AND STALKING
This one occurs when a criminal deliberately for unknown reasons targets a person or a group of people and sends them illegal and threatening messages online. The aim is to make the life of the target miserable.
EMAIL BOMBING
Email bombing is a technique used by computer criminals to crash a server or an email address. They do so by sending a large number of emails to the target address.
SPAMMING
Spam or junk mails are used by computer criminals to install malware on a computer without the knowledge of the user. Just by clicking on web links from the spam mail, you become a victim.
DENIAL OF SERVICE ATTACK
This crime targets the server of a website and sends a large number of requests. When the maximum bandwidth of the website is reached, it goes down and sometimes is unavailable. Genuine users of the website are locked out and denied the services.
IDENTITY THEFT
This crime involves collecting a person’s identity such as credit card information, bank details among others through phishing activities. The information is either sold or used by the hacker to masquerade as the legitimate owner of the details.
DATA DIDDLING
Data diddling involves sending virus programs to target computers. The virus illegally alters the data the user enters into the system rendering it useless.
CONCLUSION
Given the rise of cyber-attacks, it is important to always keep safe by avoiding unknown sites that may compromise the safety of your computer and privacy of your information (Lee).
Works Cited
Baiden, John E. “Cyber Crimes”. SSRN Electronic Journal, 2011. Elsevier BV, doi:10.2139/ssrn.1873271.
Lee, Marc. “Cyber Crimes: Preparing To Fight Insider Threats”. Computer Fraud & Security, vol 2012, no. 6, 2012, pp. 14-15. Elsevier BV, doi:10.1016/s1361-3723(12)70063-5.
Hire one of our experts to create a completely original paper even in 3 hours!