Wednesday, May 29, 2019

Computer Crime :: essays research papers

According to term computing machine abhorrence means Criminal activity directly relate to the map of estimators, specifically dirty trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.      There be many ways to commit computer crime. Some examples of computer crime are 1)     Accessing a computer, system, or network.2)     Modifying, damaging, using, disclosing, copying, or taking programs or data. 3)     Introducing a computer virus or other contaminant into a computer system. 4)     Using a computer in a scheme to de pasquinade.5)     Interfering with someone elses computer access or use.6)     Using encryption in aid of a crime.7)     Falsifying e-mail source information.8)     Stealing an information servi ce from a provider. everywhere the last twenty years, a technological revolution has occurred, as computers are now an essential element of todays society. In the world of computers, computer fraud and computer crime are very prevalent issues facing every computer user. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. A definition of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. When computer were first introduced into businesses, computer crime was defined simply as a form of while-collar crimes committed inside a computer system. Computer crimes are hard to define, because the term is not outlet to a precise definition, and it requires vast amounts of computer knowledge to understand how and why it happened. If we defined the term "computer", it means an electronic, magnetic, optical, electrochemical, or other high velocity data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable cash in ones chips held calculator, or other similar device. Computer crime laws in many states prohibit a person from performing certain acts without authorization, including others listed above. To prevent computer fraud and computer crime the government had to take a few steps. In 1974, they passed a simple Federal Privacy Act of 1974. A decade later, the computer crime was increasing rapidly, the government amended the acts and made it a federal crime. In the summary of the Acts, they are as follows     Federal Privacy Act of 1974 Goes save that the Freedom of Information Act in that it requires that individuals be able to correct federal information about themselves, by requiring that ag ency information not be used for alternate purposes without the individuals consent.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.