Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: August 1st, 2022

Computer crimes

Abstract
Computer crimes have become unpredictable occurrence of our computerized community. This phenomenon has caused both gain and loss to the individuals and companies at large. This article analyses the occurrence of these computer crimes, the classification of computer crimes, types of possible computer crimes and the potential ways to govern computer crimes.

Computer Crimes
Computer crime can be defined as the offenses that are performed against individuals or groups of people with the negative motive to intentionally harm the victim mentally or by damaging his/her system. Computer crime involves the use of computers and the network, the computer may be used in the commission of the crime or it can be the target from the attacker. Computer crimes are threats to individual security, financial state and health state and can go beyond an individual to the nation as the target. Issues surroundings computer crimes have become major threats, particularly those regarding sextortion, child grooming, copyright infringement, hacking and unwarranted mass-surveillance (Hill, 2016).
Classification of computer crimes
Computer crimes are classified in many groups in includes the following:
Cyber extortion 1. This is where the malicious attacker causes the denial of service repeatedly that is subjected to a website, computer system or an e-mail server. These attackers/hackers pretend to be caring, hence they demand money to be paid to them and in return they promise to stop the attacks and offer total protection to the victim. Another technique that is used in cyber extortion is bug poaching whereby the attacker sends a bug to a victim, the attacker then contacts the victim and promise to solve the bug when payment is made to do so.
Drug trafficking 3. Recreational drugs are sold and bought online in the darknet markets. Encryption massaging tools used in communication are used by some drug traffickers. The first site for this kind of business was the dark web which was a major marketplace for online drugs but later was shut down by law enforcement.
Computer as a target 4. Computers are targeted by an individual or a selected group of attackers/criminals. These types of crimes require the technical knowledge of the attackers of the functionality of the system. The attackers exploit the computer mostly through the network. The crimes primarily include; computer viruses, malware and also denial-of-service attacks.
Financial fraud crime 5. This is any dishonest activity that is intended to let someone to do or refrain from doing something that causes loss. The fraud in this content is as a result of obtaining a benefit by deleting, destroying suppressing, stealing output to cover unauthorized transactions or altering in an unauthorized way the stored data (Singh, 2018).
Cyberwarfare 6. This is an attack where the hackers in cyberspace take their attacks to a national-level and put all their efforts to exploit nation-state resources in the world.
Cyber terrorism 7. This is an attack that involves the cyber-terrorist to intimidate an organization or government to advance his/her social or political objectives by launching attacks against the information stored in a computer system, networks or computer itself.
The major threats that encountered in the computer crimes include; backdoors, payloads, vulnerabilities, malware, worms, rootkits, logic bombs, web shells, spyware, Trojans, ransomware, keyloggers, phishing, viruses, eavesdropping and web application security.
Computer crimes combating
Legislation 1. These are laws that are put in place to control computer crimes in every country. Mostly in developing countries the laws against computer crime are weak or sometimes they do not exist at all. In countries where these laws are weak, attackers strike from other countries’ borders and remain undetected throughout (Singh, 2018).
Awareness 2. This is a situation where an organization or government takes a step to educate internet users about the crimes that arise as they use advance technology. The internet users are educated on how to keep their sensitive information such as identities, banking, and credit card information secure, whereby if an attacker can get the access to this information the owner would suffer loss, for example, the banking information can lead the victim to lose his/her money to the attacker.
Investigation 3. In the case of computer crime a computer can be a source of evidence which is mostly performed through digital forensics (Hill, 2016). These activities are spearheaded by the internet service providers who are required to keep all their logfiles for a specified period. The investigation starts with the IP Address to trace the computer system that was involved in crime.
Prevention 4.This involves the use of personnel and systems to prevent any computer crimes. Pen testers are hired to test the systems before the attackers can find the weakness whereas intrusion detection systems are used to alert any intrusion (Trujillo, 2019).
Defenses in computer crimes include the following; Mobile secure gateway, computer access control, intrusion detection system, authentication through multi-factor authentication, firewall, data-centric security and runtime application self-protection.

References
Hill, J. B., & Marion, N. E. (2016). Introduction to Cybercrime: Computer Crimes, Laws, and Policing in the 21st Century: Computer Crimes, Laws, and Policing in the 21st Century. ABC-CLIO.
Mohamed, S. H. (2017). A legal study on the Computer Crimes Act 1997 in combating computer crimes in Malaysia (Doctoral dissertation, Universiti Teknologi MARA).
Sethi, N. (2016). A Review on Recent Computer Crimes. International Journal of Computer Science & Engineering Technology, 7(6), 244-246.

Singh, S. C. (2018). High-tech and computer crimes: global challenges, global responses. In Contemporary Issues in International Law (pp. 413-437). Springer, Singapore.
Trujillo, M. (2019). Computer Crimes. Am. Crim. L. Rev., 56, 615.

Order | Check Discount

Tags: #1 Cheap Nursing Assignment Help & Writing Services UK, Buy college essays. Paper writing service. Nursing essay writing, Essay help online: fast and affordable essay writer, Essay On Nursing – Online Essay Writer Help for Cheap, Essay Writing Service | Best Essay Writer Online, Nursing Academic Help Writers - Nursing Essay Writer

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00