![]() |
| types of computer |
Here is a list of different types of computer crimes.
Computer crimes refer to the use of information expertise for illegal purposes or for unauthorized access of a computer technique where the intent is to destroy, delete or adjust the knowledge present in the computer. Even identity thefts, misusing devices or electronic frauds are thought about to be computer crimes.
o Hacking: This involves gaining unauthorized access in to a computer technique. Usually hackers can get through the security capabilities of a computer technique and one time they are in, they have limitless access to confidential information and knowledge stored in the computer. Today, hacking of IP addresses is common as it allows the hacker to assume a false online identity and conduct criminal transactions without revealing his true identity.
types of computer
o Phishing: This is a common computer crime is the United States. Here emails are sent to gullible users that make them think that the emails are from authentic sites. The users are passed onto fake sites where they enter their confidential knowledge like usernames, passwords and credit card details. The fake sites look and feel actual and that is why plenty of people get fooled in to entering sensitive information.
o Identity Theft: This of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of somebody else's credit card details to buy lovely and services. It's been seen that blackmail and terrorism often employ identity theft.
o Computer Viruses: These are actually computer programs that can replicating themselves and harming computer systems present in a network. These viruses work without the knowledge of the users and spread from computer to another through the network, Web or removable devices like CDs and USB drives. Writing computer virus is a criminal activity and is punishable by law.
types of computer
o Cyberstalking: This is using the Web to stalk a person like somebody world do in the actual world. Here the stalker sends emails, spreads false information or issues threats using the Web. Cyberstalking is also used to prey on unsuspecting children and ladies.

0 comments:
Post a Comment