Scams theft and the likes have existed even before the development in high tech

Scams theft and the likes have existed even before

This preview shows page 7 - 10 out of 35 pages.

which have existed for centuries in the offline world. Scams, theft, and the likes have existed even before the development in high-tech equipment. The same criminal has simply been given a tool which increases his potential pool of victims and makes him all the harder to trace and apprehend. Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare Phishing scams Spam Propagation of illegal obscene or offensive content, including harassment and threats The unsolicited sending of bulk email for commercial purposes (spam) is unlawful in some jurisdictions. 7
Image of page 7
Phishing is mostly propagated via email. Phishing emails may contain links to other websites that are affected by malware. Or, they may contain links to fake online banking or other websites used to steal private account information. Way to prevent computer crime Crime involving computers is often difficult to detect and can have serious effects on its victims. Advances in technology have made computer hackers and identity thieves more creative, but there are still a number of ways to help ensure that you do not fall victim to this type of violation. Whether your computer is on a local or wide area network or is a stand- alone unit with a simple Internet connection, take the necessary measures to protect your system from these crimes. Keep your computer current with the latest patches and updates. Make sure your computer is configured securely. Choose strong passwords and keep them safe. Protect your computer with security software. Protect your personal information. Online offers that look too good to be true usually are. Review bank and credit card statements regularly. Keep your computer current with the latest patches and updates. One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they become available. By regularly updating your computer, you block attackers from being able to take advantage of software flaws (vulnerabilities) that they could otherwise use to break into your system. While keeping your computer up-to-date will not protect you from all attacks, it makes it much more difficult for hackers to gain access to your system, blocks many basic and automated attacks completely, and might be enough to discourage a less-determined attacker to look for a more vulnerable computer elsewhere. More recent versions of Microsoft Windows and other popular software can be configured to download and apply updates automatically so that you do not have to remember to check for the latest software. Taking advantage of "auto-update" features in your software is a great 8
Image of page 8
start toward keeping yourself safe online.
Image of page 9
Image of page 10

You've reached the end of your free preview.

Want to read all 35 pages?

  • Summer '18
  • Encik lajim
  • unauthorized access, Computer crime

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask You can ask (will expire )
Answers in as fast as 15 minutes