Paper Details  
 
   

Has Bibliography
9 Pages
2309 Words

 
   
   
    Filter Topics  
 
     
   
 

Delving Into Computer Crime

ed and kept for reference. The problem with this data being stored electronically is that if the system is compromised, the data can be copied and stolen very quickly and can possibly be stolen over telecommunication lines. Phreaking is a kind of theft of services. Phreaking a process used to access the telephone services illegally and run up considerable calling bills for which they are never charged(2). Using different tones, a computer can mock a request for a long-distance call, giving an individual free long-distance.Cyberstalking, defined as The act or crime of willfully and repeatedly harassing another person in circumstances that would cause a reasonable person to fear injury or death because of expressed or implied threats(1), is a relatively new problem. Irritating others over the Internet is something that commonly occurs, but the word repeatedly placed in front of that statement can make a big difference. If someone is causing a nescience that interferes with ones professional or personal life it is considered stalking.Catching the computer criminals is the tough part. There are Computer Crime Stopper groups, hackers turned good, whose sole purpose and occupation is to track down and catch computer criminals. Tracking computer activity is a hard thing to do, especially over the Internet. There is no trail left for the criminal to be followed by. Usually the only thing crime-stoppers have to go on are the IP addresses and telecommunication lines to trace to find the origin of the signal, but the perpetrator is normally long gone by the time authorities arrive.Prevention is a crucial part in protecting the computers of today. Through secure servers, which are special computers [that] provide secure connections between networked computers and outside systems,(4) companies protect credit card and other personal information of their clients. Encryption is a method of encoding(4) data using a set of key (a mathematical...

< Prev Page 6 of 9 Next >

    More on Delving Into Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA