Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What is a Computer Crime?

M.R. Anglin
M.R. Anglin

A computer crime is any unlawful activity that is done using a computer. This definition can extend to traditional crimes that are committed with the machine, such as counterfeiting money, but it also includes more tech-savvy crimes, such as phishing or logic bombs. Using a computer in this way, a criminal may be able to conduct unlawful activity with more anonymity and may be able to get away with more before he is caught.

Stalking, soliciting sex, and counterfeiting can all be considered computer crimes if a computer is used to commit them. These crimes can be committed with or without a computer, but they are only considered when the computer is used in the process of committing them. For example, if a criminal uses a graphic design program to counterfeit money, it could fall under this category, as would a person who cyberstalks another by using a computer to harass them.

Using a design program to make counterfeit money is a computer crime.
Using a design program to make counterfeit money is a computer crime.

Many times, when a person thinks of this sort of crime, he thinks of the damage that can be caused by unauthorized access to a computer by a remote user, known as a hacker. These types of crimes can be costly and damaging, and hackers who have access to computers can change, delete, copy, or damage data. For instance, should a hacker get access to a personal computer, he may have access to bank accounts and credit card numbers. If the target computer belongs to a major company or a bank, company secrets as well as worker or customer personal information could be at risk.

Hacking is a computer crime in which credit card numbers might be stolen.
Hacking is a computer crime in which credit card numbers might be stolen.

Another devastating type of computer crime is a distributed denial of service (DDOS) attack. In this type of attack, a hacker may first take control of several people's computers using a type of malware. Then the hacker sends a message to so-called zombie computers to send almost continuous requests to a view a target Web site. The Web site's server can only handle so many inquiries at once, so it either crashes or denies service to legitimate people trying to access the page. As a result, this attack can cause trouble for both the owner of the site and the person trying to view it.

Cyber bullying is one form of computer crime.
Cyber bullying is one form of computer crime.

A DDOS attack crippled Web sites such as Yahoo, Amazon, e-bay, and CNN in February 2000. Though the servers were not attacked directly, the attacker was able to take control of several other computers that may not have had proper protection. Attacks such as this highlight how important it is to keep all computers shielded from computer crime. As many hackers use malware to commit this type of crime, a good sercurity software can be invaluable in protecting a computer. In addition, a proper firewall can also help keep hackers from accessing computers without authorization.

Discussion Comments

fitness234

When people think of computer crime they usually think of electronic data theft, identity theft, and Internet piracy. But quite literally, computer theft can be as simple as someone stealing a computer. These types of computer crimes while they are physical are definitely crimes of the computer sense. Computer crime forensics have taken leaps and bounds in the ability to investigate such problems. Often computer crime investigators will use specialized software to identify when they had issues with stolen equipment.

Tracking software can be installed onto a computer so if it is stolen it can be activated from a remote location. This type of software can aid a lease in the recovery of stolen equipment as well as the apprehension of computer crime fiefs. There's an entire new area of law that has opened up because of computer crime. Computer crime research makes up a large part of the security industry on the Internet, and for good reason. With more more of our vital information making its waste to the Internet, we must ensure its protection from harmful hands.

thumbtack

There are so many different types of computer crimes but I think one of the biggest one that is overlooked is the simple invasion of privacy that people have. By logging into somebody else's personal account you are committing a crime. Personal privacy laws allow for protection of consumers from other private entities. When you access a friends account without asking them or without their permission, it may seem harmless, but you are truly committing a computer crime that can cause acute a true computer crime investigation. FBI computer crime preventions techniques have and implemented to ensure the safety of citizens private electronic data.

dkarnowski

Because of the amount of crime that is happening on the Internet, I have actually found a really good method that is effective for contacting some of my credit card accounts from theft. While most credit card companies have made available excellent policies to protect your financial resources from wrongdoing, there is still an extra layer of benefit and safety that can come from having a separate account to make Internet purchases.

What I'm suggesting, is that you actually get a separate credit card account to make your Internet purchases. By doing this you will completely separate your major accounts as well as the connectivity to your bank account that can open yourself up to identity theft and financial loss. It is important to ensure your safety on the Internet and having a separate credit card for e-commerce can be one excellent way of doing so.

Burlap

With the advent of the Internet, computer crime has become rampant. Because of the ease of access to different types of information some legal and some illicit, computer thieves and pirates have been able to take over the inter-webs. While this may seem fearful, luckily it is less fearful than actual crime on the streets. There is one exception to computer crime that absolutely scares me however.

Identity theft is a major issue that is occurring in the United States and around the world. With so much vital information now being implemented into servers and accounts across the Internet and on different computer networks, your sensitive data has been opened up and made available to attacks by computer hackers and identity thieves.

While there are many options on how to protect yourself, the best ways to avoid using your personal data on the Internet unless it is absolutely necessary.

Post your comments
Login:
Forgot password?
Register:
    • Using a design program to make counterfeit money is a computer crime.
      By: Africa Studio
      Using a design program to make counterfeit money is a computer crime.
    • Hacking is a computer crime in which credit card numbers might be stolen.
      By: Chad McDermott
      Hacking is a computer crime in which credit card numbers might be stolen.
    • Cyber bullying is one form of computer crime.
      By: creative soul
      Cyber bullying is one form of computer crime.
    • Home modems can be easily hacked if the user does not change the default password.
      By: Graça Victoria
      Home modems can be easily hacked if the user does not change the default password.
    • Criminals who use computers to steal financial and corporate data face stiff penalties.
      By: Ariusz
      Criminals who use computers to steal financial and corporate data face stiff penalties.
    • Computer crimes are usually committed by hackers.
      By: Artur Marciniec
      Computer crimes are usually committed by hackers.
    • Hacking into someone's webcam is a computer crime.
      By: Devyatkin
      Hacking into someone's webcam is a computer crime.
    • Denial-of-service attacks are carried out through a type of computer malware.
      By: www.doglikehorse.com
      Denial-of-service attacks are carried out through a type of computer malware.