Get premium membership and access questions with answers, video lessons as well as revision papers.

Discuss the types of computer crimes.

      

Discuss the types of computer crimes.

  

Answers


Francis
1. Trespass.
- Trespass refers to the illegal physical entry to restricted places where computer hardware, software & backed up data is kept.
- It can also refer to the act of accessing information illegally on a local or remote computer over a network.
Trespass is not allowed and should be discouraged.

2. Hacking.
Hacking is an attempt to invade the privacy of a system, either by tapping messages being transmitted along a public telephone line, or through breaking security codes & passwords to gain unauthorized entry to the system data and information files in a computer.

3. Tapping.
Tapping involves listening to a transmission line to gain a copy of the message being transmitted.

4. Cracking.
Cracking is the use of guesswork by a person trying to look for a weakness in the security codes of a software in order to get access to data & information.
These weak access points can only be sealed using sealed using special corrective programs called Patches, which are prepared by the manufacturing company.
A program patch is a software update that when incorporated in the current software makes it better.
NB: Cracking is usually done by people who have some idea of passwords or user names of the authorized staff.

5. Piracy.
Software, information & data are protected by copyright laws. Piracy means making illegal copies of copyrighted software, data, or information either for personal use or for re-sale.

6. Fraud.
Fraud is the use of computers to conceal information or cheat other people with the intention of gaining money or information.

7. Sabotage.
Sabotage is the illegal or malicious destruction of the system, data or information by employees or other people with grudges with the aim of crippling service delivery or causing great loss to an organization.
Sabotage is usually carried out by discontented employees or those sent by competitors to cause harm to the organization.

8. Alteration.
Alteration is the illegal changing of stored data & information without permission with the aim of gaining or misinforming the authorized users.
Alteration is usually done by those people who wish to hide the truth. It makes the data irrelevant and unreliable.

9. Theft of computer time.
Employees may use the computers of an organization to do their own work, e.g., they may produce publications for selling using the computers of the company.

10. Theft of data (i.e., commercial espionage).
Employees steal sensitive information or copy packages and sell them to outsiders or competitors for profit.
This may lead to a leakage of important information, e.g., information on marketing strategies used by the organization, research information, or medical reports.
francis1897 answered the question on March 14, 2023 at 13:43


Next: What causes errors and accidental access to data and information?
Previous: Give the reasons for hacking

View More Data Security and Control Questions and Answers | Return to Questions Index


Learn High School English on YouTube

Related Questions