Computer crimes and their classification

click fraud protection

With the development of information technologies are widely used so-called computer crimes.From them, no one is immune, neither end users nor even the secret services.A computer connected to the Internet, a priori, is in danger.Sometimes it does not save even a powerful antivirus.

information can be regarded as an intangible item, which nevertheless has a certain value.And it includes not only the work of those who worked on its development and bring to life, but also the benefits that can be obtained by using it.That is why the information of the offense so common - they are able to generate a considerable amount of money.

Computer crimes can be committed in relation to the devices themselves (as material objects), and in respect of the various programs and databases.By the way, this type of crime is not fixed by law.Today, the list of crimes related to computers is steadily increasing.Here are the main ones.

types of computer crimes

  • unauthorized access to information resources and their interception.For example, hacking and the subsequent change of information on them;
  • fraud.This is often all sorts of ads, the main idea of ​​which is that you need to send money to an unknown wallet.Submissions may be different from "and you will return the sum of two times higher" to "the person needs help";
  • removing protection software (on Internet slang - "cracking").This computer crime is committed in order to further the free use of some facilities.This term denotes a situation where the first legitimately purchased a licensed version of the program (films, books, and so on), and then began to spread pirated in the network;
  • unsolicited (mass character) all sorts of messages - from advertising to viral.These computer crimes the people are called "spam."Fortunately, almost everyone knows what it is, and do not fall for the bait scams;
  • receiving credentials of third parties to illegally use the Internet.Or consider taking a page in the social.personal networks and reading posts.In some situations, such as computer crimes may well entail criminal liability.Although the laws under which a person should be punished for the offense in this area, there is no similar cases can be regarded as "an invasion of personal space."Similarly, law enforcement agencies operate in other situations involving crimes in the field of computers;
  • totally different kind of action that the remote computer entail a "denial of service" hang your PC, maybe even partial or complete loss of information.In this case the offender appear administrator rights to "compromised" computer.

reduce to zero the probability that you will become a victim of computer fraud, is impossible.However, as much as possible to protect yourself is quite possible - you just have to choose a good antivirus system did not pass on unknown links, and do not believe the promises of a dubious about a possible enrichment.