StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

COMPUTER CRIME - Coursework Example

Cite this document
Summary
Computer crime refers to utilization of information technology to attain illegal objectives or to access a computer system without authority with the intention of causing damage or altering data in the system (Stephenson & Gilbert, 2013). Despite the full use of computers from…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
COMPUTER CRIME
Read Text Preview

Extract of sample "COMPUTER CRIME"

Computer Crime Computer crime refers to utilization of information technology to attain illegal objectives or to access a computer system without authority with the intention of causing damage or altering data in the system (Stephenson & Gilbert, 2013). Despite the full use of computers from the 1970s, crimes related to computers as victims and tools remained rare. When the first such crime was reported, Kizza (2013) observes that it was difficult for law enforcement agencies to act appropriately due to their limited knowledge as compared to perpetrators.

However, the modern world experiences an increasing rate of computer crimes, both in quantity and complexity. The latest statistics from the Federal Bureau of Investigation, FBI (2014) indicates that the complaints received in 2012 were 289,874 amounting to losses of $525,441,110, this representing 8.3% increase in losses reported to the agency in a span of one year. The trend is similar to what has been recorded from 2008. In spite of the adjustments by the FBI in tackling current wave of crimes, the threat continues to present most dynamic transformations, making them increasingly sophisticated, dangerous and common.

The widespread interconnectivity leveraging on the Internet is to blame for this trend. The Internet provides a shared and integrated platform that fosters anonymity and inability to be traced thus propagating computer crimes (Stephenson & Gilbert, 2013). Furthermore, there is a rapid increase in computer knowledge in the modern world which propagates formulation of complex attacks. There is an increasing list of the types of computer crimes. Among the common types are hacking, phishing and virus distribution.

Hacking refers to the beating of computer system security capabilities so as to gain illegal access to information stored therein. This also includes the hacking of IP addresses so as to transact under a false identity, hence anonymity in carrying out crime. Secondly, phishing entails the acquisition of sensitive information such as passwords, usernames and credit card details in the disguise of a trustworthy source. It could be executed through emails or luring users to key in personal information in criminal websites.

Criminals would often use websites having familiar looks so as to gain the users’ confidence. Finally, the crime of computer viruses involves use of computer programs with the capability of self replication that harms computer systems in a network. This occurs without the user’s knowledge and spreads from a computer to another through Internet, network or removable devices (Kizza, 2013). These crimes continue to increase in number and complexity.The usual crime detection strategies cannot be used for computer crimes.

This is because the perpetrators fast adopt new technologies than law enforcement agencies can cope up with. However, sharing information on specific security classifications could help organizations track down such criminals (Stephenson & Gilbert, 2013). Such information remains well guarded secret of the involved organizations, and excludes anyone who is not part of the security team. User awareness would also be an effective strategy as Kizza (2013) observes that it would equip users with the requisite knowledge to report any suspicious incidences that could lead to the perpetrators.

Finally, transaction audits would be critical in revealing any foreign transactions and consequently the criminals who write and distribute viruses. Whereas these measures could be effective on themselves, a combination of various approaches would give better results.ReferencesFederal Bureau of Investigation. (2014). Today’s FBI facts and figures 2013 – 2014. Washington, DC: US Department of Justice. Retrieved 11 March 2014 from http://www.fbi.gov/stats-services/publicationsKizza, J. M. (2013).

Guide to computer network security (2nd ed.). New York, NY: Springer.Stephenson, P. & Gilbert, K. (2013). Investigating computer-related crime (2nd ed.). Boca Raton, FL: CRC Press.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“COMPUTER CRIME Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
COMPUTER CRIME Coursework Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1632926-computer-crime
(COMPUTER CRIME Coursework Example | Topics and Well Written Essays - 500 Words)
COMPUTER CRIME Coursework Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1632926-computer-crime.
“COMPUTER CRIME Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1632926-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF COMPUTER CRIME

The CSI Computer Crime and Security Survey

The Computer Security Institute (CSI) COMPUTER CRIME and Security Survey for 2008 as reported by Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and COMPUTER CRIME. The study was conducted from over 500 respondents –… The respondents were pooled from organizations covering a number of industries, which include government, manufacturing, transportation, telecommunication, education, health services, and The CSI COMPUTER CRIME and Security Survey 2008 Summary The Computer Security Institute (CSI) COMPUTER CRIME and Security Survey for 2008 as reportedby Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and COMPUTER CRIME....
1 Pages (250 words) Essay

Security of Information Systems

The methods are expected to reduce COMPUTER CRIME rates in the world.... The methods are expected to play a crucial role in the minimization of computer crimes and information wars.... In the 19th century the percentage of computer crimes and information war were very low.... The increase in technology has led to emergence of various computer crimes and information wars hence the need for formal verification and security methods....
4 Pages (1000 words) Essay

Computer Crimes -Sonys PlayStation Network

nbsp;COMPUTER CRIME entails unauthorized use of computer-based technology to access, view, manipulate, share, or steal information from unsuspecting owners.... nbsp;  COMPUTER CRIME is more often common with hackers who spend considerable time learning about flaws in computer-based systems especially the ones dependent on the network.... Associated with COMPUTER CRIME include spamming, theft, terrorism, pornography, fraud among other malicious acts....
1 Pages (250 words) Case Study

Computer Crime and Safety Issues among Companies and Organization

Computer and cyber crime include:- hacking, copying of copyrighted material, theft and misuse of confidential information of someone… Using a computer as an instrument of the crime.... An example is where a person uses an employer's computer to embezzle funds from an In this case, one cannot commit crime when the computer is off Computer being the centre of crime.... In such instances, the computer is the focus of the crime....
4 Pages (1000 words) Essay

Investigating High-Technology Computer Crimes

COMPUTER CRIME has been on the rise and reported statistics, as well as policies against it, support this.... The decision by the Attorney General's to establish COMPUTER CRIME as a priority for the justice agency also means that the crime is becoming more significant than other types of crimes (Offices of the United States Attorneys, n.... As the paper outlines, computer crimes, or cybercrimes, are a crime that is conducted on computers and computer networks as aids to attack or targets of attacks....
1 Pages (250 words) Essay

Microteaching LESSON PLAN

I will focus on the types of COMPUTER CRIME that will be the basis of my group activity. At the… Thus, they can plan a protection way from the COMPUTER CRIME risks after they look at the examples of the computer and it is risks in the community. At the end of this activity students will be For example, trying to access any country government computers without authorization is one of computer crimes.... It is taken from the chapter managing information systems ethics and crime in the unit....
11 Pages (2750 words) Essay

Computer Crime Is Unlawful Activities

COMPUTER CRIME has been on rise recently… Additionally, the rise of COMPUTER CRIME is attributed to inexistence of laws related to COMPUTER CRIME (Fisch & White, 1999). COMPUTER CRIME is not always associated with physical damage of property.... The constituents are Cybercrime al affiliation: Computer Crimes COMPUTER CRIME is unlawful activities that mainly employ information technology in gaining illegal or unauthorized access to computer systems....
1 Pages (250 words) Essay

Malware, Computer Crime and Fraud

The essay "Malware, COMPUTER CRIME and Fraud" aims to examine the problem of invasion of privacy as a form of COMPUTER CRIME.... hellip; COMPUTER CRIME can be regarded as the unauthorized access and use of computer data by the users without prior permission.... This is also a class of COMPUTER CRIME.... Persecution and harassment is another class of COMPUTER CRIME which generally takes place in cyberspace.... If the criminal keeps sending the email to the person who doesn't want to receive such emails then it's a type of harassments and may be classified as COMPUTER CRIME....
6 Pages (1500 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us