StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crimes: Thefts - Essay Example

Cite this document
Summary
"Computer Crimes: Thefts" paper looks at identity theft as an example of computer crime in business and one case will be highlighted in order to support the facts. Identity theft has reportedly been mentioned as one of the top cybercrimes in the world with the United States…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Computer Crimes: Thefts
Read Text Preview

Extract of sample "Computer Crimes: Thefts"

Computers are the gadgets that have made the road to global technological advancement move several miles. Combined with the use of the internet that brings people together allowing communication and exchange of information from different parts of the world just by the touch of the mouse, there is much in terms of both vices and virtues that this technology has brought amongst its users. 

The victim accounts range from your own bank account to social media accounts. The hackers can make a lot of money through your details and screw you up in the process. Unlike earlier when it used to be hard to collect evidence to prosecute cybercrimes, the current trend has seen most of the hackers who steal personal photos of stars in the nude to organizers of multimillion-dollar scams being brought to book. To show this, we’ll look at one recent case that has ended with the criminals in the dock.

Recently in January this year, 2014, an Algerian hacker by the name of Hamza Bendelladj was arrested in Bangkok. This followed a local police tip-off by the FBI agent who apparently had been tracking the 24 years old criminal for the last 3 years. Hamza was suspected of being behind a botnet based on the notorious Zeus. Using just one of a series of illegal transactions involving 207 banks and other financial institutions, he is alleged to have netted up to $20 million. He had just begun to enjoy a luxurious lifestyle and jetting around the world in a first-class just before he was caught up with.

Currently, Hamza is facing extradition to the US and a court case in the state of Georgia (Serge 2013). But what can we do to stop identity theft? One must ensure that they do not use public computers or WiFi to connect their personal information such as bank accounts or their social media passwords. Again, credit cards such as Paypal and master card also need not be connected to through a public computer and WiFi. Remember never to share your personal account information like bank account number and social security number with fraudsters. 

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Crimes Essay Example | Topics and Well Written Essays - 500 words - 3, n.d.)
Computer Crimes Essay Example | Topics and Well Written Essays - 500 words - 3. https://studentshare.org/business/1813765-please-read-instruction
(Computer Crimes Essay Example | Topics and Well Written Essays - 500 Words - 3)
Computer Crimes Essay Example | Topics and Well Written Essays - 500 Words - 3. https://studentshare.org/business/1813765-please-read-instruction.
“Computer Crimes Essay Example | Topics and Well Written Essays - 500 Words - 3”. https://studentshare.org/business/1813765-please-read-instruction.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crimes: Thefts

Computer-Based Crimes: Identity Theft, Phishing and Pharming Scams

computer crimes may involve identity theft, cyberstalking, scams, and frauds, hacking, creation of malicious codes, child pornography, and violation of copyrights.... Intellectual challenge is the most significant reason for creating computer crimes.... This essay "Computer-Based crimes: Identity Theft, Phishing and Pharming Scams" analyses guaranteed solutions to crimes committed in the cyberworld for the US legal system.... Modern information technology, such as the internet has initiated new forms of crimes and male perpetration of old felonies effortless....
8 Pages (2000 words) Essay

The Doctrine of Cyber Law, its Effectiveness and Reliability

hellip; In the present age computers and the internet have become more sophisticated, giving the opportunity to criminals to commit serious crimes with it and this formed the basis of the enactment of several laws relating to the computers and internet.... Thus, cybercrime is something which has similarity to the term crime, as all crimes are illegal and all crimes threaten order.... rdquo; “Cybercrime” means the crimes that are committed within that space and it refers to the risks online (Wall 10)....
6 Pages (1500 words) Research Paper

Computer Crimes

This review ''computer crimes'' classifies computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices.... computer crimes or cyber crimes are crimes that are committed through the use of computers.... We can classify computer crimes into two very broad categories: crimes that are aimed towards networks or computer devices and crimes that are facilitated by the use of computers but where the target is someone or something else and not the network or other devices....
6 Pages (1500 words) Literature review

Accessing bank data crime through the use of various information technology in Saudi law

However, the same has also led to a simultaneous rise in data crimes, and identity thefts have increased manifold.... For instance, prior to the computerization of banks, most of the bank frauds or thefts involved armed robberies and breaking into banks causing physical injury to people and considerable damage to property.... The tools available at the disposal of such criminals have also risen considerably with the advent of information technology, where frauds and thefts can easily be committed from the comforts of one's own home (Forder, Quirk, 2001; Kono et al, 2002)....
7 Pages (1750 words) Dissertation

Computer Crimes, Ethics, and Privacy

Customer Inserts His/her Name Customer Inserts Customer Inserts Grade Course (23, 10, 2011) computer crimes, Ethics, and Privacy Introduction The age of technology has made our world cozier to a great extent but at the same technology has negatively affected the moral values of the society in general.... The advent of computers and internet in our daily life has given rise to computer crimes, illicit activity that is carried out by the help of computers, and these crimes have had a ponderous impact on the moral values of the people, especially adolescents....
6 Pages (1500 words) Research Paper

Management Information System: Computer Crimes

In the paper “Management Information System: computer crimes” the author analyzes computer crimes that have been affected and are prone to cyber attacks.... Three major types of computer crimes that are affecting people are identity theft, cyber stalking, and malware.... It's not just the commercial organizations that have been affected and are prone to cyber attacks, but even the individuals are equally prone of computer crimes that have reportedly been rising over the past two decades (Icove et al, 1995)....
1 Pages (250 words) Essay

Internet and criminal activity

In the paper “Internet and criminal activity” the author analyzes computer crimes.... Explain how the Internet has aided criminal activity computer crimes involve any illegal act facilitated by the computer, whether this computer is used an instrument or object for the crime.... E-commerce frauds, software piracy, and breaches of network security are the prominent types of the crimes on the internet.... The detection of these crimes is hard as these crimes are afforded by the internet....
3 Pages (750 words) Essay

Phishing Computer Crimes

PHISHING computer crimes Phishing computer crimes Author Author's Affiliation Date With the passage of time, huge developments have been done in the field of computer science.... ?? Additionally, the computer crimes appear in a wide variety of ways and also cause a number of serious problems for different people.... In addition, Hacker and Cracker are most widely used terms in computer crimes.... Also, the company should hire trustworthy personnel to minimize crimes related to computers (Parker, 2002; Worthington, 2003, pp....
4 Pages (1000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us