Paper Details  
 
   

Has Bibliography
9 Pages
2309 Words

 
   
   
    Filter Topics  
 
     
   
 

Delving Into Computer Crime

d not log off properly, and her account is thus still active; you can go in(2), basically it is using another persons access to as it were your own. The piggybacker then has access to all the past users files and can be destructive if they choose and wipe out the account.There are many different types of computer crimes, but there are basically two main categories, crimes against computers and crimes using computers. Crimes against computers are usually based on the destruction of hardware and software or the theft of computer technology.(2). Many people get mad at computers for many reasons. Computers are based on human input, thus computers make mistakes. People sometimes take the anger that builds up, after a computer has made a number of mistakes, out on the actual hardware such as: a computer monitor, tower, keyboard, or mouse. Demolished computers have been dropped, punched, kicked, and some even shot by a gun. Computer systems have also been mutilated and destroyed to destroy data and records. This is not the best method of destroying computer data. Although the system as a whole might be devastated, the data can sometimes be restored through special techniques.Crimes using computers are more prevalent. There are numerous crimes that can be committed using computer, but they are not new crimes. The crimes were already in practice before its invention but new technology makes them easier to commit and provides less of a chance of getting caught. Money is the root of a lot of crimes, for instance, embezzlement is the act of stealing money that is entrusted to you(1), or stealing from somebody that you work for. Banks are one of the best places to steal money from because, obviously, thats where a large portion of money can be found. A great deal of the money that a bank oversees is not physical cash; it is numbers in computers. Many different and ingenious ways have been developed by computer criminals to embezzle mo...

< Prev Page 4 of 9 Next >

    More on Delving Into Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA