Professional Documents
Culture Documents
Today, people use computers for many different reasons depending on their
level of skill and their needs. A look at the number of people using computers
today reveals the surprisingly high amount of individuals. As technologies
increase, the number of people using computers increases. A good example
is China, which has close to three hundred million computer users. With the
high number of computer and cyber users, it is accurate to say that computer
crime and cybercrime also increases by the day. Computer criminals rely on
the changing technologies as much as regular people do. The first cyber crime
recorded occurred in 1820. This aspect is not a surprising fact because the first
form of computer, the abacus was already around for more than a thousand
years.
Introduction
Cyber crime is an illegal activity conducted through the use of a computer.
This aspect includes the hardware device as well as the internet. In this case, the
computer and the internet act as tools that facilitate the occurrence of the
crime. Cybercrime includes a broad range of the offense. These include cyber
stalking, child pornography, unauthorized access, forgery and fraud among
others. Industries, governments and people around the world tend to focus on
various kinds of cyber crime. These include piracy, cyber stalking, cyber
terrorism, cyber pornography and cracking.
Cyber crime also involves the traditional crimes that occur over the
internet. The issue of computer and cyber crimes represents the latest and
most complicated problem around the world (Cousins, 06). For instance, there
are individual and organized hackers. Individual hackers frequently perform
these activities as a way of proving that they are good at computer
programming and that they have the capacity of hacking and breaching
software. Organized piracy in most cases occurs for monetary purposes.
These groups could hack into large enterprises like banks to gain financial
benefits. Reports from around the world indicate that in the past two years,
there have been over a million complaints around the world. Most of these
complaints included issues of hack threats, denial of services, fraud and other
computer-based problems. In some cases, the company complains of the loss of
files and corruption by viruses.
Computer crimes
Computer crimes, on the other hand, are crimes committed with the help of a
computer. Any criminal activity that occurs with the aid of a computer is
thus a computer crime. Computer crimes existed since the production of the
computer. With the changing world and increasing technology, the computer
is one of the tools that people use to aid them in their criminal activity.
This kind of crime does not necessarily involve the loss of data on the
computer or even the change of data on the computer.
A computer crime also refers to a situation whereby someone accesses
data without the permission of the administrator. This aspect shows that a
computer crime does not have to involve the loss or modification of data on
the network. The worst type of computer crime is the access to data without
notification of the administrator. Currently, many criminals conduct
computer crimes in groups. The reasoning behind this is that if done in larger
groups, there is a lower risk and ease of stealing. Many people that commit
these rogue crimes included rogue hackers and crackers, many of whom are
employees of different organizations. Statistics show an increasing amount of
computer crime, which shows the seriousness of the problem.
Conclusion
In most cases, authorities tend to underestimate the threat imposed by computer
and cyber crimes. One of the reasons could be the lack of reliable statistics on
the actual effects of the risk. Also, the ministries of companies around the
world apply different techniques on dealing with cyber crime. In enhancing
cyber security, the various agencies have to ensure that they create cultural
awareness among people. They should also ensure that they enforce lawful
cyber behaviors among teenagers, children, individuals, and organization.
The creation of activities that improve the level of awareness of information
security would further help in dealing with the problem. For instance, people
subscribing to internet banking should always know the risk factors of internet
banking. People have to remain critical of what they see and read.