The document outlines the top 5 computer crimes:
1. Child pornography, which involves using the internet to distribute sexually explicit material of minors or lure them into illegal encounters.
2. Software piracy, illegally copying and distributing software.
3. Creating and distributing computer viruses or malware to damage systems or steal user data.
4. Industrial espionage, illegally accessing a company's private information about plans, products, or trade secrets.
5. Internet fraud which uses anonymity online to scam victims out of money through deception.
4. Computer Fraud Happens when a victim is conned into believing that he will receive money or something else value. “being aware”
5. Internet fraud is one of the most common forms of computer crime, since it gives the criminal access to billions of other computers around the globe, and it is conducive to anonymity, making it easier to con unsuspecting users out of their money.
6. Identity fraud, while not always computer-related, is often committed through the use of computers, and it involves the criminal assuming the identity of another person to deceive the fraud victims.
9. Computer Industrial is an attempt to gain access to information about a company’s plans, products, clients or trade secrets.
10. In most cases, such conduct, especially when it involves accessing trade secrets is illegal. Sometimes rival companies will search through public records in order to make guesses about a company’s actions. However, when the search goes from the public to the private, industrial espionage is an illegal act and punishable with jail time and financial penalties.
13. Computer Virus Transmitter Is someone who creates a malicious virus to inflect computers from functioning properly, run annoying programs and/or gain access to the victim’s personal data.
14. Malware A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system. Spywareis a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer.
20. Child Pornography (under Age 18) through he Internet is a crime. The Internet Has also been used as a tool for child prostitution. Pedophiles have used chat rooms to lure minors into illegal sexual encounters.
21.
22. “Security measures are always being created to help prevent problems from occurring ,but knowledge is the key to prevent us from becoming a victim”