Computer Crime -General Studies Notes – For W.B.C.S. Examination.
কম্পিউটার ক্রাইম-জেনারেল স্টাডিজ নোট – WBCS পরীক্ষা।
Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company’s or individual’s private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.Continue Reading Computer Crime -General Studies Notes – For W.B.C.S. Examination.
Examples of computer crimes
Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.
- Child pornography – Making or distributing child pornography.
- Copyright violation – Stealing or using another person’s Copyrighted material without permission.
- Cracking – Breaking or deciphering codes that are being used to protect data.
- Cyber terrorism – Hacking, threats, and blackmailing towards a business or person.
- Cyberbully or Cyberstalking – Harassing or stalking others online.
- Cybersquatting – Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price.
- Creating Malware – Writing, creating, or distributing malware (e.g., viruses and spyware.)
- Denial of Service attack – Overloading a system with so many requests it cannot serve normal requests.
- Espionage – Spying on a person or business.
- Fraud – Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud.
- Harvesting – Collect account or other account related information on other people.
- Human trafficking – Participating in the illegal act of buying or selling other humans.
- Identity theft – Pretending to be someone you are not.
- Illegal sales – Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
- Intellectual property theft – Stealing practical or conceptual information developed by another person or company.
- IPR violation – An intellectual property rights violation is any infringement of another’s Copyright, patent, or trademark.
- Phishing – Deceiving individuals to gain private or personal information about that person.
- Salami slicing – Stealing tiny amounts of money from each transaction.
- Scam – Tricking people into believing something that is not true.
- Slander – Posting libel or slander against another person or company.
- Software piracy – Copying, distributing, or using software that is Copyrighted that you did not purchase.
- Spamming – Distributed unsolicited e-mail to dozens or hundreds of different addresses.
- Spoofing – Deceiving a system into thinking you are someone you really are not.
- Typosquatting – Setting up a domain that is a misspelling of another domain.
- Unauthorized access – Gaining access to systems you have no permission to access.
- Wiretapping – Connecting a device to a phone line to listen to conversations.
Please subscribe here to get all future updates on this post/page/category/website