Retrieved from https://studentshare.org/information-technology/1655436-computer-crimes
https://studentshare.org/information-technology/1655436-computer-crimes.
The constituents are rather the change of the most important information. They also include access and use of software without developer’s rights meaning that the original software developer is denied the rights by counterfeit software. Criminal activities are a breach of human and information privacy (Casey, 2011).
Hacking is one of the most witnessed computer crimes. It involves illegal access to a computer system. However, not all hackers can cause serious damage to computer systems. The criminal breaks all the initial security measures installed by the computer owner to commit an illegal event (Casey, 2011).
Another event is phishing crime. It is known for acquiring sensitive information such as usernames, passwords, and other crucial information such as credit card information. The criminal disguises as a trustworthy source to acquire these credentials (Casey, 2011).
Computer viruses are also another set of criminal activities. They are programmed to interfere with the normal working of the computer. They spread to other computers through networks and files sent to those computers. Most viruses are spread through internet use.
The best prevention for cybercrime is by the installation of restrictions. Restrictions can be both physical and by using software walls such as anti-virus programs. Securing the computer with valid and strong passwords can also be a good method to guard it (Casey, 2011). Read More