Tuesday, May 5, 2020

Type of Crime That Use It Systems as Weapons free essay sample

Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information.The different types of computer crimes have caused the introduction and use of newer and more effective security measures. Out of the many crimes that use IT systems, the one that cost us the most would have to be identity theft. Biegelman states, â€Å"Simply put, identity theft is the stealing of your good name and reputation for financial gain. We will write a custom essay sample on Type of Crime That Use It Systems as Weapons or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Yet not everyone can agree on a suitable meaning of the term. The definition of this crime differs among law enforcement, regulatory agencies, and the many studies of this subject† (2). There is big money at stake and the financial rewards for criminals are almost limitless, they go to amazing lengths to defraud their victims. The Federal Trade Commission (FTC) estimates that as many as 9 million people have their identities stolen each year (FTC, 2012). Experts agree that identity theft is a serious problem, and special precautions must be taken to avoid it. When people become the victims of identity theft, they are unaware of what just happened, and they need answers. According to the FTC, Identity theft is serious.While some identity theft victims can resolve their problems quickly, others spend hundreds of dollars and many days repairing damage to their good name and credit record. Some consumers victimized by identity theft may lose out on job opportunities, or be denied loans for education, housing or cars because of negative information on their credit reports. In rare cases, they may even be arrested for crimes they did not commit. (FTC 2012) One way of stealing someone’s identity is by Phishing. Phishing is an attempt to lure unsuspecting computer users to phony web sites that mimic the sites of legitimate businesses or public or government organizations. These copycat cites trick users into revealing private and sensitive information such as their usernames, passwords, and account numbers. This information is then used by or sent to criminals’’ (Ross 69). There is also skimming which occurs when a dishonest employee of a company steals customer’s information, such as their credit card number.This type of fraud usually happens in bars and restaurants, because the waiter will take your card to process the bill. Once they have your card, they will photocopy it, or use an electronic skimmer device to pick up the numbers. The person will use the credit cards later to make online purchases, or transfer money to their accounts. Criminals also engage in dumpster diving, which is going through a person’s trash, to obtain copies of checks, credit card and bank statements, or other personal records that bear your name, address, and even your telephone number.These types of records can help a thief; get control over your accounts or your identity. Credit card companies send pre-approved applications to consumers, and if they are not destroyed before going to trash, the thief may get access to the trash, and activate the credit cards, without the person’s knowledge. United States Department of Justice states that, â€Å"Some credit card companies, when sending credit card applications, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number, but this is not yet a universal practice† (USDOJ, 2012)Many of us are very hesitant to shop online because of the looming threats of identity theft. For those of us that are concerned because of the frequent use of personal information online the best way to keep track of your information is to monitor your accounts and bank statements each month, and check your credit report on a regular basis. If you check your credit report regularly, you may be able to limit the damage caused by identity theft. â€Å"Most people find out that they are victim of identity theft, after damage has been done to them.Filing a police reports, checking your credit reports, notifying creditors, and disputing any unauthorized transactions are some of the steps you must take immediately to restore your good name† (FTC, 2012). If you believe you are a victim of mail fraud, contact the postal inspection services immediately. If someone has used your social security number, contact the Social Security Administration to file your case. Also contact the three credit reporting agencies and have them place a freeze on your account.The Federal Trade Commission states, â€Å"It is best to close all your accounts in writing, so that you have proof of contacting the company, in case something goes wrong† (FTC, 2012). There are a few easy ways to help prevent identity theft. One identity theft victim says, â€Å"When you move and fill out the change of address card, be sure to watch for a letter from the Post Office at your new address confirming that you have changed your address. If you do not get the letter within a couple weeks, be sure to check with the Post Office to make sure they indeed paid attention to your change of address† (Privacy Rights, 2002).Lastly, Elisabeth Goodridge states, Balancing your checkbook may seem a monotonous chore, but understanding where your money goes will help you spot any irregular withdrawals or charges. Reviewing your credit card bill each month is critical as well, especially if you charge a lot of your daily purchases. If you have not already, this may be a great time to sign up for online accounts. It’s easier and faster to review accounts online, on a computer you trust. (2009) IT system crimes are clearly on the rise as more companies, organizations, and individuals are more connected to the internet, and this trend does not appear to be slowing down.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.