Bumbeng

Submitted by: Submitted by

Views: 171

Words: 654

Pages: 3

Category: Music and Cinema

Date Submitted: 03/28/2013 03:11 AM

Report This Essay

Computer fraud is rampant, as the use of computers becomes part of our daily lives, with greater and greater frequency. The definition of what constitutes computer fraud becomes ever more complex with the ingenuity of people who intend to deceive, misrepresent, destroy, steal information, or cause harm to others by accessing information through deceptive and illegal means. Just as you have to be careful when you’re walking down the street, or in your own home when you lock up at night, you’ve got to be careful of the many examples of computer fraud that will make their way onto your computer.

Types of computer fraud vary and can be complex or simple. Simple types of fraud might include:

* Sending hoax emails intended to scare people.

* Illegally using someone else’s computer or “posing” as someone else on the Internet.

* Using spyware to gather information about people.

These actions are computer fraud because they are deliberate misrepresentations of the truth. They progress into more harmful actions as they grow more complex and include:

* Emails requesting money in return for “small deposits.”

* Pyramid schemes or investment schemes via computer with the intent to take and use someone else’s money.

* Emails attempting to gather personal information to be used to access and use credit cards or social security numbers.

* Using someone else’s computer to access personal information with the intent to use such fraudulently.

* Using the computer to solicit minors into sexual alliances.

* Violating copyright laws by copying information with the intent to sell information, like DVDs, CDs.

* Hacking into computer systems to gather large amounts of information for illegal purposes.

* Hacking into or illegally using a computer to change information, such as grades, work reports, etc.

* Sending computer viruses or worms with the intent to destroy or ruin someone else’s computer.

There are many different legal...

More like this