Bussiness continuity and disaster recovery

User Generated

Fen1

Writing

Description

Conduct research to determine three types of computer crime. Please provide a detailed description for all crimes, and share an example of where an organization was impacted by each of the types.
• Elaborate on how the impact of computer crime is quantified. Please share at least two examples.
• Include at least four (4) reputable sources.
• Your final paper should be 1,000-to-1,250-words, and written in APA Style.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: TYPES OF COMPUTER CRIMES

Types of Computer Crimes
Name
Institutional Affiliation
Date

1

TYPES OF COMPUTER CRIMES

2

Research on Computer Crimes
There is a broadly expanding coverage list of computer crimes today. However, this type
of crimes falls under an all-embracing category of criminal activities. Two broad classifications
of computer crime include traditional and modern forms. The traditional forms of computer
crimes comprise of criminal actions such as fraud, kidnapping, theft, stalking, property crimes,
unauthorized use of computers, as well as pornography (Swanson & Territo, 1980). Olasanmi
(2010) identifying a number of modern-day computer crimes such as spamming, credit card and
ATM frauds, identity stealing, phishing, hacking, as well as denial-of-service among a multitude
of other offenses.
Three Types of Computer Crimes
Hacking
According to Yar (2006), this type of offense is the most commonly used, analyzed, and
debated activity. He argues that hacking as crime serves as an extremely focused problem for the
public concern, especially due to the imminent threat it presents to the society. Yar (2006)
defines ‘hacking’ as an unapproved access and consequent utilization of other people’s
computers or computer systems. According to Yar (2006), earlier hackers had affection for
technology and often wanted to know how it worked. However, Yar (2006) their drive could
sometimes push programs beyond their purposes. Yar (2006) argues that the term ‘hacker' never
had a negative connotation as it has in modern society.
Additionally, Yar (2006) claims that attacks occur in many phases, including information
collection, scanning, as well as gaining access into target systems. In this case, information
collection entails several methods of getting information, data, or opening security holes. Yar
(2006) compares hacking t...


Anonymous
I use Studypool every time I need help studying, and it never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags