Computer crime


Download 0.64 Mb.
Sana02.04.2023
Hajmi0.64 Mb.
#1319823
Bog'liq
Computer crime

Computer crime

Normuhammadova Laylo

  • Alternatively known as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes called a "hacker," that illegally browses or steals a company's or individual's private information. Sometimes, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
  • In most cases, someone commits a computer crime to obtain goods or money. Greed and desperation are powerful motivators for some people to try stealing through computer crimes. Some people may also commit a computer crime because they are pressured, or forced, to do so by another person.
  • Some people also commit computer crimes to prove they can do it. A person who can successfully execute a computer crime may find great personal satisfaction. These types of people, sometimes called black hat hackers, like to create chaos and wreak havoc on other people and companies.
  • Another reason computer crimes are sometimes committed is because they're bored. They want something to do and don't care if they commit a crime.
  • A computer crime is any unlawful activity that is done using a computer.
  • Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
  • Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual.
  • Also at this end of the spectrum is the growing crime of identity theft. Midway along the spectrum lie transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet.
  • Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism—that is, the use of the Internet to cause public disturbances and even death.

Write True/False

  • Alternatively known as cyber crime, e-crime, electronic crime, or hi-tech crime.
  • These are’t specific crimes with specific victims.
  • Cybercrime ranges across a spectrum of activities.
  • A computer crime is any unlawful activity that is do using a computer.
  • These types of people, sometimes called black hat hackers, like to create chaos and wreak havoc on other people and companies.
  • They want something to do and don't care if they commit a crime.

Use the words from the text to complete the sentences

  • Computer crime is an act performed by a ___________________ computer user, sometimes called a "hacker," that illegally browses or steals a company's or individual's private information.
  • Greed and desperation are powerful ______________ for some people to try stealing through computer crimes.
  • These types of people, sometimes called black hat hackers, like to _________________________ on other people and companies.
  • A computer crime is any _________________ activity that is done using a computer.
  • Cybercrime ranges across a ____________ of activities.

Reference:

  • https://www.computerhope.com
  • https://www.britannica.com

Download 0.64 Mb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling