--%>

Types of Computer crimes

Explain the various types of Computer crimes ?

E

Expert

Verified

Types of Computer crimes:

Three different computer crimes as per my knowledge are:

1.) Unauthorized access means the person who is stealing other person’s mail id either by his user name or by his password. They delete the important files after sending it back to own file for own uses which creates a computer crime. There are most people who have done their masters and bachelors and post graduate from computer specialization and they have learnt how to hack the computers and how to hack the other person’s id. Some employees in many organizations or firms also try to do that.

2.) Computer virus: The person is creating a nuisance that is the virus in a computer which is also related to crime. The virus that harms the original file and especially this happens in cyber café which is a part of computer crime. The person is adding the software’s which create virus in the main file and corrupt the life of a computer.

3.) Threats in cyber cafe: They create harassment in cyber café by sending a fake email to anybody means to an extent that has no limits as I have also given the example. Frauds also cross the limit to that extent that they send an e-mail to an unknown person which relates to the sexual signatures which is increasing the computer crimes.

   Related Questions in Computer Network Security

  • Q : Critics of online communities The

    The Critics of online communities discuss that there is very big potential for deceit in online relationships in comparison to face-to face ones. Explain the advantages or disadvantages of having the capability to represent yourself differently in an

  • Q : Application and benefits of IP security

    List out the various application and benefits of IP security?

  • Q : Headers fields in MME Explain the

    Explain the headers fields which are defined within the MME?

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : Define Wifi Broadband What do you mean

    What do you mean by the term Wifi Broadband?

  • Q : Key distribution center Explain the key

    Explain the key distribution center?

  • Q : What is triple encryption Explain the

    Explain the term triple encryption?

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)