Showing Page:
1/2
Computer crime
Alternatively referred to as cybercrime, e-crime, electronic crime, or hi-
tech crime. Computer crime is an act performed by a knowledgeable
computer user, sometimes referred to as a hacker that illegally browses or
steals a company's or individual's private information. In some cases, this
person or group of individuals may be malicious and destroy or otherwise
corrupt the computer or data files.
Examples of computer crimes
Below is a listing of the different types of computer crimes today. Clicking on
any of the links below gives further information about each crime.
Child pornography - Making or distributing child pornography.
Copyright violation - Stealing or using another person's Copyrighted material without
permission.
Cracking - Breaking or deciphering codes that are being used to protect data.
Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
Cyberbully or Cyberstalking - Harassing or stalking others online.
Cybersquatting - Setting up a domain of another person or company with the sole
intentions of selling it to them later at a premium price.
Creating Malware - Writing, creating, or distributing malware
(e.g., viruses and spyware.)
Denial of Service attack - Overloading a system with so many requests it cannot serve
normal requests.
Espionage - Spying on a person or business.
Fraud - Manipulating data, e.g., changing banking records to transfer money to an
account or participating in credit card fraud.
Harvesting - Collect account or other account related information on other people.
Human trafficking - Participating in the illegal act of buying or selling other humans.
Identity theft - Pretending to be someone you are not.
Illegal sales - Buying or selling illicit goods online including drugs, guns, and
psychotropic substances.
Intellectual property theft - Stealing practical or conceptual information developed by
another person or company.
IPR violation - An intellectual property rights violation is any infringement of another's
Copyright, patent, or trademark.
Phishing - Deceiving individuals to gain private or personal information about that
person.
Salami slicing - Stealing tiny amounts of money from each transaction.
Scam - Tricking people into believing something that is not true.
Slander - Posting libel or slander against another person or company.
Showing Page:
2/2
Software piracy - Copying, distributing, or using software that is Copyrighted that you
did not purchase.
Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
Spoofing - Deceiving a system into thinking you are someone you really are not.
Typosquatting - Setting up a domain that is a misspelling of another domain.
Unauthorized access - Gaining access to systems you have no permission to access.
Wiretapping - Connecting a device to a phone line to listen to conversations.

Unformatted Attachment Preview

Computer crime Alternatively referred to as cybercrime, e-crime, electronic crime, or hitech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files. Examples of computer crimes Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime. • Child pornography - Making or distributing child pornography. • Copyright violation - Stealing or using another person's Copyrighted material without permission. • Cracking - Breaking or deciphering codes that are being used to protect data. • Cyber terrorism - Hacking, threats, and blackmailing towards a business or person. • Cyberbully or Cyberstalking - Harassing or stalking others online. • Cybersquatting - Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price. • Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.) • Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests. • Espionage - Spying on a person or business. • Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud. • Harvesting - Collect account or other account related information on other people. • Human trafficking - Participating in the illegal act of buying or selling other humans. • Identity theft - Pretending to be someone you are not. • Illegal sales - Buying or selling illicit goods online including drugs, guns, and psychotropic substances. • Intellectual property theft - Stealing practical or conceptual information developed by another person or company. • IPR violation - An intellectual property rights violation is any infringement of another's Copyright, patent, or trademark. • Phishing - Deceiving individuals to gain private or personal information about that person. • Salami slicing - Stealing tiny amounts of money from each transaction. • Scam - Tricking people into believing something that is not true. • Slander - Posting libel or slander against another person or company. • • • • • • Software piracy - Copying, distributing, or using software that is Copyrighted that you did not purchase. Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses. Spoofing - Deceiving a system into thinking you are someone you really are not. Typosquatting - Setting up a domain that is a misspelling of another domain. Unauthorized access - Gaining access to systems you have no permission to access. Wiretapping - Connecting a device to a phone line to listen to conversations. Name: Description: ...
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4