[go: up one dir, main page]

0% found this document useful (0 votes)
25 views3 pages

Computer Crimes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 3

Computer Crimes

Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that
illegally browses or steals a company's or individual's private information. Such crimes include:

Identity Theft
This is when someone gains access to your personal
information and uses it for his or her own benefit.
Hackers have the ability to gain access to financial
Accounts or social security numbers and destroy a
person’s life.

Cyber-stalking
The use of the Internet or other electronic means to
stalk or harass an individual or group. This may
include harassing them, false accusations and gaining
uninvited access to their life.

Phishing
Phishing is the fraudulent attempt to obtain sensitive
information or data, such as usernames, passwords,
credit card numbers, or other sensitive details by
impersonating oneself as a trustworthy entity in a
digital communication.

DDoS Attack
These are attacks aimed at shutting down services or
networks and making them inaccessible to the
intended users. DDoS Attacks are targeted primarily
at web servers of high-profile organizations such as
the government or trade firms.
Ransomware Attack

Ransomware is a type of malware attack in which the


attacker locks and encrypts the victim’s data and then
demands a payment to unlock and decrypt the data.
Ransomware generally blocks victim’s access to their
own data and deletes the same if a ransom is not paid.

Counter-measures For
Computer Crime

All of these are viable options in trying


to prevent computer crimes :
Identity Theft - Data Encryption
Cyberstalking - Use of a VPN
Phishing - Data Encryption
DDoS Attack - IPS/IDS
Ransomware Attack - Use of a Proxy Server
Sources

https://jsberrylaw.com/blog/common-types-of-computer-crimes/
https://www.government.nl/topics/cybercrime/forms-of-cybercrime
https://www.fbi.gov/investigate/cyber
https://www.kaspersky.com/resource-center/threats/what-is-cybercrime

I used these sites to gather the necessary information for the given task because they all met the standard criteria I had chosen to use. The information
presented on these websites had been written by multiple government agencies and well-known organizations. The authors are also people who
specialize in cyber-security. The information on the websites were not only up- to-date but also had correlating information which proved that it was
well-researched.

Members include : Tony Kirlew


D’Andre Beckford
Phillip Sinclair

You might also like