ClubEnsayos.com - Ensayos de Calidad, Tareas y Monografias
Buscar

Computer Crimes


Enviado por   •  24 de Abril de 2014  •  466 Palabras (2 Páginas)  •  172 Visitas

Página 1 de 2

Today the technology has advanced, and without giving us forewarning it is already part of the everyday life of the people, the organizations, and of course is of great importance because it results in progress in the development of a country. But as there are advances in computer technology and the great influences they have on much of the areas of social life, illicit actions have arisen which we know as cyber crime. They have become more frequent and sophisticated with the development of programming and the internet.

A computer crime or cyber crime refers to illegal activities by means of computers or the Internet aimed at the destruction and damage of computers, electronic media, and computer networks. Some computer-related crime are even greater and complex, these may include crimes such as fraud, theft, blackmail, forgery, in which computers networks are used.

Unfortunately, there is a range of criminal activities carried out by electronic means such as: •illegal entry into systems.

• The illegal interception of networks.

•Interference of data.

•Damage to information (deletion, deterioration, alteration).

• Misuse of artifacts

• Blackmail, electronic fraud.

• Attacks on systems.

• Violation of confidential information.

Computer fraud- these behaviors consist of unlawful manipulation, through the creation of false data or alteration of data or processes contained in computer systems, carried out in order to obtain undue profits. Criminals will get a benefit for the following:

1. Alter data for illegally entry. This requires that the criminal has a high level of technique and therefore it is common to employees of a company that know well the same information networks and can access it to alter data how to generate false information that will benefit them, create instructions and unauthorized processes or damage systems.

2. Alter, destroy, delete or steal data, an event that can be difficult to detect.

3. Alter or delete files.

4. Alter or make a bad use of systems or software, alter or rewrite code for fraudulent purposes. These events require a high level of knowledge.

The use of computer systems includes other forms of computer fraud to rob banks, carry out extortion or stealing classified information.

For this reason, it is important to know the different types of fraud and crime computer than there is to see, and protect suitable information within networks and thus to have a better understanding of this and perform encryption of information

...

Descargar como (para miembros actualizados)  txt (3 Kb)  
Leer 1 página más »
Disponible sólo en Clubensayos.com