You are on page 1of 8

Computer Related

Fraud
Computer Related Fraud
Is the use of computers, the internet and other internet
services to defraud people or organization of their
resources

Example:
Emails attempting to gather personal information such as
account numbers, Social Security numbers, and
passwords
5 Main types of Computer-Fraud
• Distributing hoax emails
• Accessing unauthorized computers
• Engaging in data mining via spyware and malware
• Hacking into computer systems to illegally access
personal information, such as credit cards or Social
Security numbers
• Sending computer viruses or worms with the intent to
destroy or ruin another party's computer or system.
Distributing hoax emails
Which are emails that demand or request money through
various methods more commonly by threats or
deception.
Accessing unauthorized computers
approaching, trespassing within, communicating with,
storing data in, retrieving data from, or otherwise
intercepting and changing computer resources without
consent.
Engaging in data mining via spyware
and malware
Malware is an umbrella term for viruses, trojans,
spyware, adware etc. It is an abbreviation of “malicious
software”
Data mining is basically the analysis of data, Spyware,
as the name implies, is software that spies on people. It
can be anything from
cookies to trojans.
Hacking into computer systems to
illegally access personal information,
such as credit cards or Social Security
numbers
the gaining of unauthorized access to data in a system
or computer. once accessed the hacker would usually
use the information gained from breaching your
computer’s security for their own benefit.
Sending computer viruses or worms
with the intent to destroy or ruin
another party's computer or system.
This is relatively self explanatory, this can be done in a
number of ways, such as attaching a malware to an
email you would send to someone.

You might also like