Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Phishing
Phishing is a computer crime that involves only theft of identity, which uses spoofed emails that are designed to bait recipients to fraudulent sites that trick them into divulging their
personal financial information. The information can include credit card personal numbers, bank
account names, and passwords or social security personal numbers (Kunz & Wilson, 2004). An
example of phishing is a customized e-mail of the e-bay site that is sent to unsuspecting e-mail
address. Such an e-mail contains a URL that is different from the official e-bay URL, but the
manner in which it is customized can lure a person into clicking it. The URL is usually a site that
has been designed by a Phisher to steal the victim's E-bay e-mail address, username, and
password. In such a case, the victim loses his or her details to the Phisher and can lose important
details and money.
Theft Computer Crime
Theft computer crimes in the world are rife. These crimes are usually diverse, and they
involve individuals who gain access to personal property or information by using computers. The
property can include programs, data, computer time, computer output, programs, or services. The
culprits who perpetuate this category of computer crime usually alter with the input or output of
a computer without the owner's authorization. The culprit then destroys or uses the proprietary
property or information as per their ulterior motive (Kunz & Wilson, 2004). An example of this
computer crime is internet piracy. Internet piracy occurs when an individual operates a "pay-foraccess" site that offers pirated software that have disabled copy-protection elements. People pay
Unauthorized access
Unauthorized access amounts to electronic invasion or gaining of access to personal
resources through computer resources without authorization or permission. It stands as a
prerequisite to different computer crimes and fraud (Kunz & Wilson, 2004). One example of
unauthorized access is hacking. Hacking is the illegal practice of accessing a computer or
network without authorization.
The most common forms of digital crime
Hacking
Hacking has been rampant in the contemporary world occasioned by the steady advancement in
technology over the years. It exists in different faces, which include unauthorized accessing of
private sites, defacing, bombing, hijacking, and denial of service. Defacing is simply altering the
content's of someone's website whereas hijacking means redirecting someone elsewhere when
trying to access a particular website deliberately to alter the operations of the website. Bombing
is the act of overwhelming a particular site with many limitless messages to crash or slow down
the server. In denial of service, hackers through running programs send many requests to a site
concurrently and incessantly from many sources (Wall, 2007).
Pirating
References
Kunz, M., & Wilson, P. (2004). Computer Crime and Computer Fraud (pp. 3-146).
Montgomery: Montgomery County Criminal Justice Coordinating Commission.
Retrieved from
http://www6.montgomerycountymd.gov/content/cjcc/pdf/computer_crime_study.pdf
Reyes, A. (2007). Cyber crime investigations: Bridging the gaps between security professionals,
law enforcement, and prosecutors. Rockland, MA: Syngress Pub.
Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge:
Polity.