1.Computer fraud happens when a victim is conned into believing that he will receive money or something else of value. There are common types of this crime currently in practice. "Phishing" scams involve creating fake emails while pretending to be a legitimate business like a bank or credit company that ask the victim to confirm personal information. Some other types include phony emails about a bogus inheritance, jobs overseas handling money transactions (for a large salary) and illegitimate loan approvals.
2.Computer industrial espionage involves the stealing of trade secrets or spying on persons through technological means for bribery, blackmail or corporate/personal advantage.One notable variation of this crime is termed the "hack, pump and dump." An account is created with an online brokerage company and multitudes of other accounts are hacked into and used to purchase particular stocks. When the stock's value goes up, the stock is sold through the original online account. Other methods include using spyware software (such as a Trojan horse) to find out logins and passwords, electronic eavesdropping and use of computerized surveillance to obtain company secrets.
3.A computer virus transmitter is someone who creates a malicious virus to infect computers from functioning properly, run annoying programs and/or gain access to the victim's personal data. This type of software is commonly known as "malware." Persons can unknowingly download these programs through websites, emails and pop-up windows. Common types of malware are called adware, spyware and Trojan horses.
4.Software piracy is one of the most common computer crimes. Copying software for distribution or personal use is considered an illegal act. Programs that are not protected with encryption keys (installation ID number), malware protection or other types of anti-piracy methods are easy to copy. However, these tools are not 100 percent foolproof. It can never be assumed that someone cannot find away around these types of protections.
Therefore, anti-piracy methods will constantly be fine-tuned and improved.
Knowingly selling, distributing or buying child pornography (under age 18) through the Internet is a crime. The Internet has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters. Prosecution of these crimes is difficult due to the anonymous nature of the Internet (see Resources below).
VIDEOS FOR TOP 5 COMPUTER CRIMES:
THIS VIDEO SHOWS THE COMPUTER CRIMES.
THIS VIDEO SHOWS THE CYBER CRIMES.
MY OWN POINT OF VIEW:
IN THIS WORLD WE CAN BE A VICTIM OR THE SUSPECT. THE KNOWLEDGE IS THE KEY TO FREEDOM.
PowerPointPresentation
click here....SOURCE:
http://www.ehow.com/about_4660145_top-five-computer-crimes.html#ixzz1WaDQGwuj
http://www.ehow.com/about_4660145_top-five-computer-crimes.html#ixzz1WaEBbNEv
http://www.ehow.com/about_4660145_top-five-computer-crimes.html#ixzz1WaEH2z4B
http://www.ehow.com/about_4660145_top-five-computer-crimes.html#ixzz1WaEOl0cy
http://www.ehow.com/about_4660145_top-five-computer-crimes.html#ixzz1WaEUrQo0
Top 5 Computer Crime's
TOP 5 COMPUTER CRIMES BY APRIL MAE BARSOBIA
View more presentations from elective1
this topic is very reliable to us ,The IT people who use computers in every transactions or their needs must be responsible and knowledgeable enough ..
TumugonBurahin:))
nice topic...
TumugonBurahinit can give us a knowledge
about computer crimes that
we can be a victim or suspect...
Good Topic !
TumugonBurahinTo be aware us to this kind of a crime, especially to those people who are knowledgeable about computers, sometimes they are the one who committed computer crime.
this topic i learned a lot about the top 5 computer crimes....
TumugonBurahingood topic.. we learn that they also crime in the computer..
TumugonBurahinfantastic topic!!! not just crime happening in the society but also we can find crimes in the computer..
TumugonBurahingood topic it hits some check-marks on my list.nice topic
TumugonBurahinit's definitely fine! totally good! and completely nice! luv it
TumugonBurahinI find this list very informative and interesting. It's especially helpful to the ones who are new to the online world, more specifically the ones who are just starting out with a Windows machine, since Macs are more bullet proof. But of course, it does depends on the knowledgeability of the user!
TumugonBurahinKevin Paquet,
http://pinoyteens.net
Interested topic.....Now i know what those crimes....
TumugonBurahinyes its true!!! not all the time we gain KNOWLEDGE in the COMPUTER!!! some times we commit crimes!!! but we just simply ignore on it!!!
TumugonBurahinjust like the FIRST video!!! he didn't know that his committing CRIME !!! :))
nice two, haha :)
TumugonBurahin..just share knowledge through computer using internet..continue posting more interesting topic. two tumbs up !! .good job !
TumugonBurahinkakaiba iba ito ha!!!!power
TumugonBurahin