INFO4MYSTREY

This blog is created for educational purposes. Info4mystery archive and support student, teacher, Educationalists, Scholars and other people for learning by facilitating reflection, questioning by self and others, collaboration and by providing contexts for engaging in higher-order thinking.

Full width home advertisement

Popular Posts

Post Page Advertisement [Top]

The meaning of each subject is an indispensable step towards proper legal treatment on that subject. The problem of correct recognition and classification of a crime is equivalent to a new field of legal emissions. When academic academics point out the question of computer computers for the first time, they know as soon as they face this problem. While United Nations Manual prescribes for computer crime prevention and control: "There is a full problem with regard to the lack of body compressors or computer-related crimes."
A computer crime also refers to a situation where a person accesses data without authorization from the administrator. This aspect shows that computer crime does not need to be accompanied by loss or change of network data. The worst type of computer crime is accessing data without administrator notification. At present, many criminals carry computer crime in groups. The reason behind it is that if it is done in larger groups, there is less risk and stealing is easier. Many people who commit adverse states include false hackers and crackers, many of them employees of different organizations. Statistics show a rise in crime rate on the computer, showing the severity of the problem.
Computer crimes include hardware and software robbery as well as data destruction and so on. These are illegal acts against computers or telecommunications equipment using computers or telecommunications. These include:
·         Theft of hardware
·         Software theft
·         Abuse of office computer for personal use
·         Theft of company information
·         Theft and misuse of passwords for access to databases and sites that are not entitled to access
·         Hacking or cracking systems and sites
·         Hackers get unauthorized access to computers and telecommunications facilities for fun, such as hacking on the NASA site. These individuals challenge other computer systems for education, because of curiosity or to compete with their peers. They may try to use a more powerful computer, gain respect from fellow hackers, build a reputation or get an expert without formal education.
·         Cracks are given unauthorized access to systems and cause damage to them. They can steal information, destroy data, use illegal software or refuse the service. These individuals are planning to cause a loss to meet some social motives or just for pleasure. Many creative and distributors of computer viruses belong to this category.
·         Preventing and misusing credit card information: This type of procedure occur when the information stored on computer systems is infiltrated and modified or physically retrieved via hard disks; removable storage media or other virtual medium.

No comments:

Post a Comment

Labels

Bottom Ad [Post Page]

| Designed by Colorlib