Computer crime – Study material
Computer crime, or cybercrime,
refers to any crime that involves a
computer and a network, where the computers may or may not have played an
instrumental part in the commission of a crime. Netcrime refers,
more precisely, to criminal exploitation
of the Internet.
Computer crime encompasses a broad range of
potentially illegal activities. It may be divided into one of two types of
categories: (1) crimes that target
computer networks or devices directly; (2) crimes facilitated by computer networks or devices, the primary target of which is independent of
the computer network or device.
Examples of crimes that primarily target computer
networks or devices would include:
- Computer viruses
- Denial-of-service attacks
- Malware (malicious code)
Examples of crimes that merely use computer networks
or devices would include:
- Cyber stalking
- Fraud and identity theft
- Information warfare
- Phishing scams
A computer can be a source of evidence. Even though the computer is not directly used
for criminal purposes, it is an excellent device
for record keeping, particularly
given the power to encrypt the data.
If this evidence can be obtained and decrypted, it can be of great value to
criminal investigators.
Spam, or the unsolicited sending of bulk email for
commercial purposes, is unlawful to varying degrees. As applied to email,
specific anti-spam laws are
relatively new, however limits on unsolicited electronic communications have
existed in some forms for some time.
Computer fraud is any
dishonest misrepresentation of fact
intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result
in obtaining a benefit by:
- Altering computer input in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
- Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;
- Altering or deleting stored data;
- Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may be facilitated using computer
systems, including bank fraud, identity theft, extortion, and theft of
classified information.
The content of
websites and other electronic communications may be distasteful, obscene or
offensive for a variety of reasons. In some instances these communications
may be illegal. Many jurisdictions place limits on certain speech
and ban racist, politically
subversive, or inflammatory material that tends to incite hate crimes.
One area of Internet
pornography that has been the target of the strongest efforts at
curtailment is child pornography.
Whereas content may be
offensive in a non-specific way, harassment directs obscenities and derogatory
comments at specific individuals focusing for example on gender, race,
religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested
parties (cyber bullying, cyber stalking, harassment by computer, hate
crime, Online predator, and stalking).
Any comment that may be found derogatory or offensive is considered harassment.
Hacker or cracker,
who accesses a computer system by
circumventing its security system.
Adjusted to:
http://en.wikipedia.org/wiki/Computer_crime
No comments:
Post a Comment