Sunday, February 7, 2010

Lesson 15 Computer Crime

COMPUTER CRIME

A computer crime is define as any criminal activity that is related to the use of computers. These activities that is related to the use of computers. These activities include computer fraud, copyright infringement, computer theft and computer attack.

COMPUTER FRAUD

Computer fraud is define as having an intention to take advantage over or causing loss to other people, mainly on monetery basis throught the use of computers.

These are many forms of computer fraud which include email hoaxes, programme fraud, investment scheme, sales promotions and claims of expertise on certain fields.

Students need to be aware of other computers frauds such as health fraulds,scam and hacking. Students will also most likely get false information while researching information on the internet.
COPYRIGHT INFRINGEMENT

Copyright infrigement is defined as a violation of the right secured by a copyright. Copyright infringement involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal.
with the current technology,the most perfect copy of the original copy can be downloaded from the internet.

COMPUTER THEFT

Computer theft is defined as the anauthorised use of another person's property with the intention to deny the owner the rightful possession of that property or its use.

Example of computer theft include :

. transfer of payments to the wrong accounts.
. tap into data transmission lines on database at no cost
. divert goods to the wrong destination

COMPUTER ATTACK

Computer attack may be defined as any activities taken to disrupt the equipment of computer sistems, change processing control or corrupt stored data.

Computer attack can be in the forms of :

. physical attack that dirupt that uses the computer facility or its transmission lines.
. an electronic attack that uses the power of electromagnetic energy to overload
computer circuitry.
. a computer network attack that uses a malicious code to exploit a weakness in software,or in the computer security practices of a computer user.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.