Cybercriminal: How dangerous is it? |
Posted: April 19, 2016 |
For computer crimes are considered all cases in which there isinclude a violation of the following things: Visit passipatel.ca for more.
Thefts and frauds The most common forms of thefts and frauds include an abuse of information and communication technologies such as: Credit cards frauds The offender will benefit data from other credit card in order to make illegal purchase of certain goods or services, or to make other changes to the account. Possibility of fraud also exists in the case of trafficking in securities executed through the Internet. More than 16% of the total trade exchange is happening through the Internet. Identity theft It is a case of unlawful gaining of the use of personal data, in order to obtain goods and services on behalf of the other person. Identity thefts are often equalized with fraud credit cards, but it can also have other forms. For example, electronic fraud arrangements (selling or buying Real Estate), electronic payment of accounts etc. Taking advantages of Computer Services Taking advantages of Computer Services includes all forms of computer and telecommunication services which could create adverse consequences on the users of these services. Some of these forms are: the theft of broadcast signal through cable television services; assault services; sending an undesirable and upsetting messages (spam); installing programs with advertising content. Computer spying This works on the use of specialized computer software (spyware) that are being placed in the computer of the victim with the purpose to undertake the control of the system: collecting and receiving information; installing other types of software. Hacking and illegal entering into computer systems Broader definition of hacking includes all forms of use of technology misuse for the purposes for which that technology was not intended. Hacking represents access to a computer system without any expressed or implied license from the owner of the system. The definition of hacking is: illegal access to one or more computer systems are abuses of the security which can be achieved by using some of the security crossbars, such as: passwords and 'firewalls' in order to use them or steal data. Viruses, distribution and other forms of malware The term computer virus was used for the first time in 1970 as part of the ARPANET in order to verify the computer programs that are harmful to the computer system. Furthermore, the term computer virus, also, has another term: "computer infection program" or malicious software (malware). "Computer program infection" refers to the four categories of malicious software: the logical bombs (logical bombs), Trojans (Trojan horses), viruses and worms.
|
|||||||||||||||||||||||||||||||||||||||||||
|