2. Computer crime is the commission of illegal
acts through the use of a computer or against
the computer system.
Computers or computer system can be the
object of the crime (destroying a company’s
computer center or a company’s computer
file).
3. As well as the instrument of a crime (stealing
computer lists by illegally gaining access to a
computer system using a home computer).
Most economically damaging kinds of
computer crime are introducing viruses, theft
of services and disruption of computer
systems.
4. Computer abuse:
◦ is the commission of acts involving a computer that
may not be illegal but are considered unethical.
Ex: Spamming.
Antivirus:
◦ Is software designed to check computer systems
and disks for the presence of various computer
viruses.
5. Spamming:
◦ Marketers send out unsolicited mass email to
recipient who have not requested this information.
Hacking:
◦ Hackers obtain access to proprietary data such as
customer information and passwords.
6. Jamming;
◦ Jammers use software routine to tie up the
computer hosting a web site so that legitimate
visitors cannot access the site.
Malicious Software:
◦ Cyber vandals use data flowing through the internet
to transmit viruses.
7. Sniffing:
A form of electronic eavesdropping. Intercept
information passing from a user to the computer
hosting a website (credit card and confidential data are
such information).
Spoofing:
◦ Spoofers fraudulently misrepresent themselves as
other organizations, setting up false web sites
where they can collect confidential information
from unsuspecting visitors to the site.
8. A hacker is a person who gains unauthorized
access to a computer network for profit, criminal
mischief or personal pleasure.
There are many ways that hackers break-ins can
harm business.
Some malicious intruders have planted logic
bombs, Trojan horses and other software that
can hide in a software or network until executing
at a specified time.
9. In a denial of service attacks, hackers flood a
network server or web server with many
thousands of false communications or
requests for services in order to crash the
network. The network receives so many
queries that it can not keep up with them and
is thus unavailable to service legitimate
requests.