Monday, June 22, 2009

Types of Computer Crimes

Computer crimes refer to the use of information technology for illegal purposes or for unauthorized access of a computer system where the intent is to damage, delete or alter the data present in the computer. Even identity thefts, misusing devices or electronic frauds are considered to be computer crimes.

Here is a list of different types of computer crimes.

• Hacking: This involves gaining unauthorized access into a computer system. Usually hackers are able to get through the security capabilities of a computer system and once they are in, they have unlimited access to confidential information and data stored in the computer. Today, hacking of IP addresses is very common as it allows the hacker to assume a false online identity and conduct criminal transactions without revealing his true identity.

• Phishing: This is a common computer crime is the United States. Here emails are sent to gullible users that make them believe that the emails are from authentic sites. The users are passed onto fake websites where they enter their confidential data like usernames, passwords and credit card details. The fake websites look and feel real and that is why many people get fooled into entering sensitive information.

• Computer Viruses: These are actually computer programs that are capable of replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from one computer to another through the network, Internet or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law.

• Identity Theft: This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft.

• Cyberstalking: This is using the Internet to stalk a person just like someone world do in the real world. Here the stalker sends emails, spreads false information or issues threats using the Internet. Cyberstalking is also used to prey on unsuspecting children and women.

About Author:
Pauline Go is an online leading expert in the legal industry. She also offers top quality articles like : Criminal Law.

Article Source:

No comments:

Post a Comment

I thank for the comment!