Computer Fraud And Crimes

Computer Fraud And Crimes

Length: 1006 words (2.9 double-spaced pages)

Rating: Excellent

Open Document

Essay Preview

More ↓
Computer Fraud and Crimes

In the world of computers, computer fraud and computer crime are very prevalent
issues facing every computer user. This ranges from system administrators to
personal computer users who do work in the office or at home. Computers without
any means of security are vulnerable to attacks from viruses, worms, and illegal
computer hackers. If the proper steps are not taken, safe computing may become
a thing of the past. Many security measures are being implemented to protect
against illegalities.

Companies are becoming more aware and threatened by the fact that their
computers are prone to attack. Virus scanners are becoming necessities on all
machines. Installing and monitoring these virus scanners takes many man hours
and a lot of money for site licenses. Many server programs are coming equipped
with a program called "netlog." This is a program that monitors the computer use
of the employees in a company on the network. The program monitors memory and
file usage. A qualified system administrator should be able to tell by the
amounts of memory being used and the file usage if something is going on that
should not be. If a virus is found, system administrators can pinpoint the user
who put the virus into the network and investigate whether or not there was any
malice intended.

One computer application that is becoming more widely used and, therefore, more
widely abused, is the use of electronic mail or email. In the present day,
illegal hackers can read email going through a server fairly easily. Email
consists of not only personal transactions, but business and financial
transactions. There are not many encryption procedures out for email yet. As
Gates describes, soon email encryption will become a regular addition to email
just as a hard disk drive has become a regular addition to a computer (Gates

Encrypting email can be done with two prime numbers used as keys. The public
key will be listed on the Internet or in an email message. The second key will
be private, which only the user will have. The sender will encrypt the message
with the public key, send it to the recipient, who will then decipher it again
with his or her private key. This method is not foolproof, but it is not easy to
unlock either. The numbers being used will probably be over 60 digits in length
(Gates p.98-99).

The Internet also poses more problems to users. This problem faces the home
user more than the business user. When a person logs onto the Internet, he or
she may download a file corrupted with a virus.

How to Cite this Page

MLA Citation:
"Computer Fraud And Crimes." 30 Mar 2020

Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Essay about Computer Based Crimes And Fraud

- Internal control is the most important business practice of the company, and it ensures the accuracy and reliability of financial reporting and protects the resources from any fraudulent activities. As technology grows, the number of computer based crimes and fraud increases; however, it is possible to control this computer based crimes with effective and efficient internal control systems within the company. According to Whittington & Pany (2014), the impact of IT on the auditing process is great; therefore, the auditors should consider and understand client’s internal control, data retention and processing policies in planning and timing of the audit....   [tags: Internal control, Audit, Auditing]

Research Papers
1044 words (3 pages)

Essay about Computer Crimes versus Traditional Crimes

- Computer Crimes versus Traditional Crimes A computer hacker can steal more with a computer than a weapon. For example, internet auction fraud (i.e., EBay) was by far the most reported offense, comprising 44.9% complaints as opposed to check fraud which made up 4.9% complaints.1 It is my opinion that many crimes involving computers are the same as crimes committed without one and that the computer is just a tool to help aide the criminal in committing the offense. Stealing is a crime and should not be considered different just because a computer is involved....   [tags: Crime Hacker Internet Theft Fraud]

Free Essays
1659 words (4.7 pages)

Computer Fraud and Abuse Act Essay

- ... He then transferred the information he found to an internet gossip site. He received 41 months in prison. The same sentence a child pornographer received that month. Another example of someone prosecuted using the CFAA is Keith Downey. Keith was 28 when he attacked PayPal servers. The sentence Keith received was a 15 year prison sentence. The same sentence that people who abuse children, and murder people because of gang activity receive. The CFAA is currently an issue. Many people want the CFAA reformed to this day....   [tags: internet, malicious code, virus]

Research Papers
868 words (2.5 pages)

Computer Crimes Essays

- Computer Crimes come in a variety of names and can include hate crimes, telemarketing and internet fraud, identity theft and credit card account theft. These are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the internet. It is very difficult to gauge the amount of damage and/or financial loss that has resulted from computer crimes. Many times the victim does not even know that they have been targeted or even that they are a victim. Those that do realize that they are a victim of a computer crime many times do not report it to the authorities or have no way of knowing what caused them to be a victim in the first place....   [tags: Computer Software Hacking Security]

Free Essays
1710 words (4.9 pages)

Essay about Computer Fraud

- Computer Fraud As much as $40 billion are lost every year due to flourishing computer crimes. In 1993 alone, Internet, the world wide system of computer networks, was swindled out of approximately $2 billion, and about $50 million were stolen from various companies such as GTE Corp., AT&T, Bell Atlantic and MCI ( Meyer and Underwood 45). Ironically these same organizations have been collaborating with software manufacturers for an expanded software production ( Cook 53 ). Multinational corporations and international authorities are threatened by these innumerable white collar crimes since such crimes are most difficult to prevent, and/or detect and highly profitable to the offenders ( Stern...   [tags: Papers]

Research Papers
1171 words (3.3 pages)

Computer Crimes Essay

- Computer Crimes Computer crimes are a major issue in the world today. They are taken place in people’s home, office, and in lots of places. A person should be very cautious about the type of personal information that they enter on there someone else’s computer as well as there own. These things could come back to haunt you in the future. Criminal activity where a computer or network is the source, target, place or tool of a crime is what we call computer crime. Some other terms for computer crime are cybercime, e-crime, hi-tech crime, and electronic crime....   [tags: Security]

Research Papers
1119 words (3.2 pages)

Using the Internet for Computer Crimes Essay

- Modern technology has laid the track for criminals. Many criminals have jumped on the train of cyber crimes by using the internet. Cyber crimes allows criminals to act fast and get instantaneous satisfaction, yet allows them to feel like they are being anonymous. Cyber crimes usually permits criminals to target individuals, ones finances, or the public, but avoiding these crimes by early detection and more importantly prevention are extremely imperative. On the internet, there are an abundance of stalkers and predators....   [tags: cyber crime, stalkers, defamation, ]

Research Papers
1448 words (4.1 pages)

Essay on Computer Crimes of Today

- Computer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayís computer hackers. Software piracy is a major crime on the Net. $7.5 billion of American Software is stolen each year. Industrial Espionage is gaining access to remote sites illegally. Stealing of information from corporate sites is extremely illegal. Password Sniffers are used to get someoneís password. IP spoofers changes your identity. Many things can be stolen from companies....   [tags: essays research papers fc]

Free Essays
1435 words (4.1 pages)

Computer Crimes Essay

- Computer Crimes Computer Crimes are on the rise in the state of Oklahoma with three of the most common being identity theft, credit card fraud, and computer hacking. A confused caller was having troubles printing documents. He told the technician that the computer was saying that the computer 'could not find the printer.' The user had even tried turning the computer screen to face the printer, but his computer still could not 'see' the printer. Identity Theft Instances of identity theft have increased as the willingness of lenders like issuers of credit cards to extend credit without physical human contact, the ability to transact sales and other business at a distance (online and via t...   [tags: Identity Theft]

Free Essays
1054 words (3 pages)

Fraud Essays

- FRAUD MANY OF MY FRIENDS and acquaintances are still reluctant to use their credit-card numbers on the Internet, even to buy from well-known merchants over secure connections, and even when their credit-card issuers offer full protection against fraudulent charges. This side of the Internet fraud problem has received much more attention than the other side: that Internet merchants have no really effective way to protect themselves against credit-card fraud. Standard credit-card processing software will give the merchant an approval if the card account is valid, and has enough open credit to cover the sale....   [tags: essays research papers]

Free Essays
707 words (2 pages)

Related Searches

When he or she executes that
program, the virus is released into the system. When a person uses the World
Wide Web(WWW), he or she is downloading files into his or her Internet browser
without even knowing it. Whenever a web page is visited, an image of that page
is downloaded and stored in the cache of the browser. This image is used for
faster retrieval of that specific web page. Instead of having to constantly
download a page, the browser automatically reverts to the cache to open the
image of that page. Most people do not know about this, but this is an example
of how to get a virus in a machine without even knowing it.

Every time a person accesses the Internet, he or she is not only accessing the
host computer, but the many computers that connect the host and the user. When
a person transmits credit card information, it goes over many computers before
it reaches its destination. An illegal hacker can set up one of the connecting
computers to copy the credit card information as it passes through the computer.
This is how credit card fraud is committed with the help of the Internet. What
companies such as Maxis and Sierra are doing are making secure sites. These
sites have the capabilities to receive credit card information securely. This
means the consumer can purchase goods by credit card over the Internet without
worrying that the credit card number will be seen by unauthorized people.

System administrators have three major weapons against computer crime. The
first defense against computer crime is system security. This is the many
layers systems have against attacks. When data comes into a system, it is
scanned for viruses and safety. Whenever it passes one of these security layers,
it is scanned again. The second resistance against viruses and corruption is
computer law. This defines what is illegal in the computer world. In the early
1980's, prosecutors had problems trying suspect in computer crimes because there
was no definition of illegal activity. The third defense is the teaching of
computer ethics. This will hopefully defer people from becoming illegal hackers
in the first place (Bitter p. 433). There are other ways companies can protect
against computer fraud than in the computer and system itself. One way to
curtail computer fraud is in the interview process and training procedures. If
it is made clear to the new employee that honesty is valued in the company, the
employee might think twice about committing a crime against the company.
Background checks and fingerprinting are also good ways to protect against
computer fraud.

Computer crime prevention has become a major issue in the computer world. The
lack of knowledge of these crimes and how they are committed is a factor as to
why computer crime is so prevalent. What must be realized is that the "weakest
link in any system is the human" (Hafner and Markoff p. 61). With the
knowledge and application of the preventative methods discussed, computer crime
may actually become an issue of the past.

Works Cited

Bitter, Gary G., ed. The MacMillian Encyclopedia of Computers. MacMillian
Publishing Company: New York, 1992.

Gates, William. The Road Ahead. New York : Penguin Books, 1995.

Hafner, Katie & John Markoff. Cyberpunk. New York : Simon and Schuster, 1991.

Romney, Marshall. "Computer Fraud – What Can Be Done About It?" CPA Journal
Vol. 65 (May 1995): p. 30-33.
Return to