Computer Crime

Computer Crime


  • Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.

    Examples of computer crimes

    Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.

  • Child pornography - Making or distributing child pornography.

  • Copyright violation - Stealing or using another person's Copyrighted material without permission.

  • Cracking - Breaking or deciphering codes designed to protect data.

  • Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.

  • Cyberbully or Cyberstalking - Harassing or stalking others online.

  • Cybersquatting - Setting up a domain of another person or company with the sole intention of selling it to them later at a premium price.

  • Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)

  • Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.

  • Doxing - Releasing another person's personal information without their permission.

  • Espionage - Spying on a person or business.

  • Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud.

  • Harvesting - Collect account or account-related information on other people.

  • Human trafficking - Participating in the illegal act of buying or selling other humans.

  • Identity theft - Pretending to be someone you are not.

  • Illegal sales - Buying or selling illicit goods online, including drugs, guns, and psychotropic substances.

  • Intellectual property theft - Stealing practical or conceptual information developed by another person or company.

  • IPR violation - An intellectual property rights violation is any infringement of another's Copyright, patent, or trademark.

  • Phishing - Deceiving individuals to gain private or personal information about that person.

  • Salami slicing - Stealing tiny amounts
    of money from each transaction.

  • Scam - Tricking people into believing something that is not true.

  • Slander - Posting libel or slander against another person or company.

  • Software piracy - Copying, distributing, or using software that is Copyrighted that you did not purchase.

  • Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.

  • Spoofing - Deceiving a system into thinking you're someone you are not.

  • Typosquatting - Setting up a domain that is a misspelling of another domain.

  • Unauthorized access - Gaining access to systems you have no permission to access.

  • Wiretapping - Connecting a device to a phone line to listen to conversations.


    What is an Operating System? » Computer Shortcut Keys and their Functions » Keyboard Function Keys » Computer Basics - Hardware - Software - Parts

    Short Stories for Kids - Moral Stories – English Short Stories for Children - Moral Stories for Kids - Stories for Kids - Funny Story for Kids - Scary Stories for Kids - Really Funny Short Stories - Bedtime Stories
    Proverb Stories
    Powerful Motivational Quotes for Students » Success Quotes » English Short Stories for Kids

    Cabin Crew Jobs & Career Advice » Secretary Job Description » Receptionist Job Description » Top 100 Interview Questions and Answers » How to Prepare for an Interview » How to Write a CV » How to Choose a Career » Computer Shortcut Keys and their Functions

    Scholarships in Australia » Scholarships in Austria » Scholarships in Belgium » Scholarships in Canada » Scholarships in Germany » Scholarships in Ireland » Scholarships in Italy » Scholarships in Japan » Scholarships in Korea » Scholarships in Netherlands » Scholarships in Switzerland » Scholarships in UK » Scholarships in USA

    Scholarships for Study in Africa » Scholarships for African Students » Undergraduate Scholarships » African Women Scholarships & Grants Scholarships for Study in Africa » Scholarships for African Students » Undergraduate Scholarships » African Women Scholarships & Grants Scholarships for Study in Africa » Scholarships for African Students » Undergraduate Scholarships »

  • Click here to post comments

    Join in and write your own page! It's easy to do. How? Simply click here to return to Computer Basics FAQ.