Cyber crime consists of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing /Internet fraud). In addition to cyber crime, there is also “computer-supported crime” which covers the use of computers by criminals for communication and document or data storage. While these activities might not be illegal in and of themselves, they are often invaluable in the investigation of actual crimes. Computer technology presents many new challenges to social policy regarding issues such as privacy, as it relates to data mining and criminal investigations.
(You are correct, hacking, cracking and coding are some of the cybercrime) Besides that, Child Pornography, Cyber Stalking, Denial of service Attack, Virus Dissemination, Software Piracy (Copying genuine software or programs), Credit Card Fraud, and Phishing are also cybercrimes.
2006-09-27 02:43:22
·
answer #1
·
answered by Anonymous
·
1⤊
0⤋
1
2016-06-03 23:20:42
·
answer #2
·
answered by Thresa 3
·
0⤊
0⤋
CyberCrime is using the internet to make money in an illegal fashion. Examples include hacking and cracking, identity theft, copyright infringement for downloading copied movies and songs, etc...
Basically, CyberCrime defines the act of performing illegal activities over the internet for personal or monetary gain.
2006-09-27 02:41:01
·
answer #3
·
answered by Anonymous
·
0⤊
0⤋
Cyber crime consists of specific crimes dealing with computers and networks (such as hacking) and the facilitation of traditional crime through the use of computers (child pornography, hate crimes, telemarketing /Internet fraud). In addition to cyber crime, there is also “computer-supported crime” which covers the use of computers by criminals for communication and document or data storage. While these activities might not be illegal in and of themselves, they are often invaluable in the investigation of actual crimes. Computer technology presents many new challenges to social policy regarding issues such as privacy, as it relates to data mining and criminal investigations.
Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)
Hacking is a felony in the United States and most other countries. When it is done by request and under a contract between an ethical hacker and an organization, it's OK. The key difference is that the ethical hacker has authorization to probe the target.
Software cracking is the modification of software to remove protection methods: copy prevention, trial/demo version, serial number, hardware key, CD check or software annoyances like nag screens and adware. Distribution of cracked software ("warez"), or patches to circumvent software protection on software (commonly known as "cracks") is generally an illegal (or more recently, criminal) act of copyright infringement.
This refers to transforming or changing the characteristics of a signal to make it more suitable for some intended application, usually for transmission from one location to another or for storage onto some medium that is different than the original medium. Coding can improve fidelity, optimize carrier bandwidth, increase essence carriage, improve security or provide error detection and correction.
2006-09-27 02:59:22
·
answer #4
·
answered by Anonymous
·
0⤊
1⤋
What estrong said. Hacking IS a crime. I'm going to be going to college to be a computer forensic or cyber crime investigator. Soliciting under age "children" is a cyber crime, too.
2006-09-27 02:46:18
·
answer #5
·
answered by Anonymous
·
0⤊
0⤋
Hacking is not a crime.
And by no means is coding.
2006-09-27 02:42:02
·
answer #6
·
answered by Anonymous
·
0⤊
1⤋
This has been answered many times before
2016-08-08 15:58:17
·
answer #7
·
answered by ? 3
·
0⤊
0⤋
it's questionable and there are actually many possible answers to the question...
2016-08-23 07:40:59
·
answer #8
·
answered by Anonymous
·
0⤊
0⤋