Computer Crime

Updated: 06/22/2018 by Computer Hope

Cyber crimeAlternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.

Examples of computer crimes

Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.

  • Child pornography - Making or distributing child pornography.
  • Copyright violation - Stealing or using another person's copyrighted material without permission.
  • Cracking - Breaking or deciphering codes that are being used to protect data.
  • Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
  • Cyberbully or Cyberstalking - Harassing or stalking others online.
  • Cybersquatting - Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price.
  • Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)
  • Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.
  • Espionage - Spying on a person or business.
  • Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud.
  • Harvesting - Collect account or other account related information on other people.
  • Human trafficking - Participating in the illegal act of buying or selling other humans.
  • Identity theft - Pretending to be someone you are not.
  • Illegal sales - Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
  • Intellectual property theft - Stealing practical or conceptual information developed by another person or company.
  • IPR violation - An intellectual property rights violation is any infringement of another's copyright, patent, or trademark.
  • Phishing - Deceiving individuals to gain private or personal information about that person.
  • Salami slicing - Stealing tiny amounts of money from each transaction.
  • Scam - Tricking people into believing something that is not true.
  • Slander - Posting libel or slander against another person or company.
  • Software piracy - Copying, distributing, or using software that is copyrighted that you did not purchase.
  • Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
  • Spoofing - Deceiving a system into thinking you are someone you really are not.
  • Typosquatting - Setting up a domain that is a misspelling of another domain.
  • Unauthorized access - Gaining access to systems you have no permission to access.
  • Wiretapping - Connecting a device to a phone line to listen to conversations.

CMA, Computer fraud, Cyber, Cyber law, Dark web, Deep web, Scam, Security terms