What are different types of computer crimes?

The term "computer crime" describes a wide range of crime involving the use of computers. Generally, it is referred to specifically to crimes committed via the Internet or other computer networks used by businesses or governments. The well -known forms of computer crime include the spread of viruses and hacking into the networks to steal or relax private information. Sharing material protected by copyright has long been a controversial and illegal internet practice. Criminals also use computers to hitchhike, harass or exploit others. Although computers are not directly employed in the crime committee, records concerning the offense can be maintained on computers or computer networks. For this reason, investigators can entertain computer equipment as evidence or require network providers to release Records or data that may relate to a criminal investigation. Most coercive agencies employ specialists in the field of computer forensic negotiations for V VEducating computer crimes and computer crimes.

The most famous form of computer crime includes "hacking", the practice of burglary into private computer networks. Hackers were once considered to be harmless writing, but in the 21st century they have access to a huge amount of private information about the entire population. This information is sometimes used for identity theft; Other times, information is simply promoted on public pages where other criminals can be used. Governments are sometimes suspicious of hacking places or other nations, a practice called "Cyber ​​Warfare".

6 -count. Some viruses are called spyware because they send private information to the user to another location. "Scareware" describes ads or programs that claim to detect a non -existent virus on a computer, and then direct users to a web or program that actually contains a virus. Collective term for these progRamy is "malware", short for "malicious software". Another type of virus can effectively turn off the website by saturating its network by activity; This crime is known as an attack by rejection of service.

A huge amount of personal data is available on the Internet, especially since the rise of social networks. Criminals sometimes use this information for persecution or harassment of individuals. Especially an example of this is the exploitation of the child. Other criminal use of social networks include "cyber bullying" or even murder for rent, as in a well -promoted case of 2011 in the United States. Any suspicious case of computer crime should be reportedly reported to the Agency for Participation and Related Computer Network Administrators.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?