Sunday, July 28, 2019
Categories of Computer Crime Essay Example | Topics and Well Written Essays - 500 words
Categories of Computer Crime - Essay Example codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records. Today, the biggest crime created through computer use is the electronic financial account transfer (Computer-Based Crime, 2011). To date, identity theft has the fastest growing crime rate in America. Identity theft is the pilfering and illegal use of private information from an unsuspecting individual to access personal financial accounts. The targeted personal data include a victimÃ¢â¬â¢s address, birth date, telephone number, social security number (SSN), bank account number, credit card number, or other valuable identification records to be used for the thiefÃ¢â¬â¢s economic gain. Criminals use this information in opening new credit and depository accounts, applying for home or car loans, leasing homes, apartments or vehicles (Brody, Mulig & Kimball, 2007) applying for benefits, or filing fake tax returns (Palmer, 2006). In worst cases, perpetrators use the obtained private information to take over the victimÃ¢â¬â¢s identity, create enormous debts, or use in a criminal activity under the victimÃ¢â¬â¢s name (Brody, Mulig & Kimball, 2007). Phishing is a scam that uses volumes of electronic mail messages to attract innocent victims into disclosing private information. A phishing email illustrating a believable problem lures the victim to a fake link that is a replication of the victimÃ¢â¬â¢s bank web address; the victim then fixes the imaginary concern and verifies account information and divulges personal identification. Subsequently, the phisher uses the pilfered PIN number, secret code, and identity to drain the victimÃ¢â¬â¢s bank account (Brody, Mulig & Kimball, 2007). Pharming is a technically higher form of phishing wherein a virus is unknowingly downloaded on the victimÃ¢â¬â¢s computer. The prey keys in a genuine web address but is instead redirected to a
Subscribe to: Post Comments (Atom)
Post a Comment
Note: Only a member of this blog may post a comment.