Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
Examples of computer crimes
Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.
- Child pornography - Making or distributing child pornography.
- Copyright violation - Stealing or using another person's copyrighted material without permission.
- Cracking - Breaking or deciphering codes that are being used to protect data.
- Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
- Cyberbully or Cyberstalking - Harassing or stalking others online.
- Cybersquatting - Setting up a domain of another person or company with the sole intentions of selling it to them later at a premium price.
- Creating Malware - Writing, creating, or distributing malware (e.g., viruses and spyware.)
- Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.
- Espionage - Spying on a person or business.
- Fraud - Manipulating data, e.g., changing banking records to transfer money to an account or participating in credit card fraud.
- Harvesting - Collect account or other account related information on other people.
- Human trafficking - Participating in the illegal act of buying or selling other humans.
- Identity theft - Pretending to be someone you are not.
- Illegal sales - Buying or selling illicit goods online including drugs, guns, and psychotropic substances.
- Intellectual property theft - Stealing practical or conceptual information developed by another person or company.
- IPR violation - An intellectual property rights violation is any infringement of another's copyright, patent, or trademark.
- Phishing - Deceiving individuals to gain private or personal information about that person.
- Salami slicing - Stealing tiny amounts of money from each transaction.
- Scam - Tricking people into believing something that is not true.
- Slander - Posting libel or slander against another person or company.
- Software piracy - Copying, distributing, or using software that is copyrighted that you did not purchase.
- Spamming - Distributed unsolicited e-mail to dozens or hundreds of different addresses.
- Spoofing - Deceiving a system into thinking you are someone you really are not.
- Typosquatting - Setting up a domain that is a misspelling of another domain.
- Unauthorized access - Gaining access to systems you have no permission to access.
- Wiretapping - Connecting a device to a phone line to listen to conversations.