Free Encyclopedia of Ecommerce » Free Encyclopedia of Ecommerce » Computer Crime - Definitions, Types Of Computer Crimes, Anti-cyber-crime Legislation, Enforcement Agencies, International Computer Crime

Computer Crime - Types Of Computer Crimes

internet files online cyber

Distributed denial of service attacks rank among the most widely reported cyber-crimes. They first appeared in mid-1999 and are relatively easy to perpetrate. Many of the tools required to carry them off are freely available online. Often, DDS attack networks consist of hundreds of compromised systems. The attacker inaugurates the attack sequence from one or more consoles, and it can affect thousands of systems worldwide.

Virus programs infect computer files by inserting copies of themselves into those files; they are spread from host to host when users transmit infected files by e-mail, over the Internet, across a company's network, or by disk. The Melissa Virus interrupted e-mail service around the world when it was posted to an Internet newsgroup on March 26, 1999, affecting perhaps 100,000 users and one-fifth of all U.S. businesses. Related problems include worms, which can travel within a computer or network without a user transmitting files; trojan horses, which are disguised as innocuous files but which, once activated, can steal users' login names and passwords, thus facilitating identity theft; and logic bombs, programs activated by a specific event.

Two reports issued by the CIA's National Intelligence Council and the Center for Strategic and International Studies in December 2000 predicted that, during the first two decades of the 21st century, Internet-enabled terrorists would launch attacks on the United States with computer viruses and logic bombs in an attempt to destroy America's private-sector infrastructure. The reports also envisioned a future cyber-arms race, for which the United States would need to develop a "cyber-arsenal."

The Internet facilitates terrorism by permitting virtually anonymous communication among terror-ists—transmissions that are very difficult to track and intercept. The targets of cyber-terrorists could include air-traffic systems and stock exchanges. Hackers even have successfully broken into governmental systems and launched denial-of-service attacks, such as the 2000 hacker penetration of a printer at the U.S. Navy's Space and Naval Warfare Center that resulted in the transmission of potentially sensitive information to a server in Russia. In 1994, hackers breached the Air Force's main command and control research center. The following year, the Pentagon reported 250,000 attacks on its computers, with 65 percent resulting in computer network entry.

Other widely publicized computer crimes involved online fraud, such as stock scams and securities fraud via the Internet. The Securities and Exchange Commission (SEC), which receives about 300 complaints a day concerning online scams, devotes one-fourth of its enforcement staff to computer-related offenses. Theft of online content also is common. A Software & Information Industry Association study maintained that one-third of all business software applications in use in 1999 were pirated copies. And the Internet has made the distribution of information obtained in identity thefts, such as a person's name or social security number, much quicker and easier. The dissemination of child pornography online also has garnered widespread public and law-enforcement attention. Other offenses, such as stalking victims via the Internet, have only recently begun to be addressed.

Computer Crime - Anti-cyber-crime Legislation [next] [back] Computer Crime - Definitions

User Comments

Your email address will be altered so spam harvesting bots can't read it easily.
Hide my email completely instead?

Cancel or

Vote down Vote up

over 2 years ago

tnk u

Vote down Vote up

over 2 years ago

Definition of Traditional crime in computer crime, is what i need urgently.

Vote down Vote up

almost 3 years ago

Thanks for helping with my ICT work for school LOL

Vote down Vote up

almost 4 years ago

hAVE BEEN HAVING A SERIOUS PROBLEM WITH MY COMPUTOR, CELL PHONE AND LAND HACKING ISSUES. iT'S A HIGHLY CONTROL MADNESS AT HOME AND IN PUBLIC SETTING. CURRENTLY, LOCAL LAW ENFORCEMENT IS UNABLE TO ASSIST OR BELIEVE THAT THIS IS A REAL AND VERY SERIOUS PROBLEM. SO, WHO IS MORE KNOWLEDGEABLE AND MORE UP TO DATE WITH THIS AND SIMILAR HACKING PROBLEMS?

Vote down Vote up

over 1 year ago

hi

Vote down Vote up

over 1 year ago

Os ydych yn glir am yr hyn y maent yn ei gynnig, gallwch hyrwyddo eich busnes yn seiliedig ar y gwahaniaethau sy'n rhaid i chi fel y bydd darpar gwsmeriaid yn troi i chi.

Vote down Vote up

over 1 year ago

Hi ha centenars de raons per les que el negoci no té èxit i cap d'ells vénen de tu mateix. Més culpar l'economia o el govern això i allò. Des de la meva experiència, aquest tipus de negoci sense dubte col · lapsar.

Vote down Vote up

almost 2 years ago

AWESOME

Vote down Vote up

about 2 years ago

tlseoer.com is a platform to learn about basics of seo, internet marketing and website/blog promotion.

Vote down Vote up

about 2 years ago

gsg

Vote down Vote up

over 2 years ago

Could i be provided with the literature review of computer crime

Vote down Vote up

over 2 years ago

I can't find the types of computer crimes too...

Vote down Vote up

over 3 years ago

vhfjgjhgjk

Vote down Vote up

over 3 years ago

awwwwwkward