Attacks:
Having an intention to take advantage over or causing loss to other people. It includes e-mail hoaxes, programme fraud, investment schemes, sales promotions & claims of expertise. We need to be aware of other computer frauds such as health frauds, scams and hacking. We will also most likely get false information.
Copyright Infringement:
A violation of the rights secured by a copyright. It involves illegal copy or reproduction of copyrights material by the black market group. The open commercial sale of pirated item is also illegal. Currently, the most perfect copy of the original copy can be downloaded.
Theft:
The unauthorised use of another person’s property with the intention to deny the owner the rightful possession of that property or its use. Eg:
Any activities taken to disrupt the equipment of computer systems, change processing control or corrupt stored data. It can be in the forms of:
Thursday, March 4, 2010
1.2.4.2 : Computer Crimes
Fraud:
transfer of payments to the wrong accounts
tap into data transmission lines on database at no cost
divert goods to the wrong destination
physical attack that disrupt the computer facility or its transmission lines.
an electronic attack that uses the power of electromagnetic energy to overload computer circuitry.
a computer network attack that uses a malicious code to exploit a weakness in software, or in the computer security practices of a computer user.
Posted by ALFA 10 - 11 SAHC DOT COM at 5:15 AM
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment