Thursday, May 30, 2019

Computer Crime :: essays research papers

According to term estimator crime means Criminal activity flat cogitate to the use of computing machines, specifically illegal trespass into the computer system or database of a nonher, manipulation or theft of stored or on-line data, or sabotage of equipment and data.       at that place are many ways to commit computer crime. Some examples of computer crime are 1)     Accessing a computer, system, or network.2)     Modifying, damaging, using, disclosing, copying, or taking programs or data. 3)     Introducing a virus or other contaminant into a computer system. 4)     Using a computer in a scheme to defraud.5)     Interfering with someone elses computer access or use.6)     Using encryption in aid of a crime.7)     Falsifying e-mail source information.8)     Stealing an information service from a pro vider. Over the last twenty years, a technological revolution has occurred, as computers are now an essential element of todays society. In the conception of computers, computer fraud and computer crime are very prevalent issues facing every computer user. Computers without any means of security are under attack(predicate) to attacks from viruses, worms, and illegal computer hackers. A definition of computer crime has changed over the years as the users and misusers of computers have expanded into new areas. When computer were first introduced into businesses, computer crime was defined simply as a form of while-collar crimes committed inside a computer system. Computer crimes are hard to define, because the term is not subject to a precise definition, and it requires vast amounts of computer knowledge to understand how and why it happened. If we defined the term "computer", it means an electronic, magnetic, optical, electrochemical, or other amply speed data processing d evice performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a take-away hand held calculator, or other similar device. Computer crime laws in many states prohibit a person from performing certain acts without authorization, including others listed above. To prevent computer fraud and computer crime the government had to take a few steps. In 1974, they passed a simple Federal Privacy playact of 1974. A decennary later, the computer crime was increasing rapidly, the government amended the acts and made it a federal crime. In the summary of the Acts, they are as follows     Federal Privacy Act of 1974 Goes further that the Freedom of Information Act in that it requires that individuals be able to correct federal information about themselves, by requiring that agenc y information not be used for alternate purposes without the individuals consent.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.