What is computer crime ?

1 Answer

Answer :

Terrorism , theft , robbery , snatching , robbery, etc. are all kinds of crimes around our society. In the same way, in today's modern world, various kinds of crimes are being committed in the world of computers. It is a computer crime to commit any illegal act directly or indirectly using computer hardware , software , network , resources , data or information. With the revolutionary change in computer, the amount of crime in this world is also increasing. Computer crimes are usually committed through a variety of networks , the Internet, and memory devices. These crimes damage a variety of business systems , personal security and even personal computers. The Association of Information Technology Professionals-AITP defines the following as computer crime. 1. The use, access, modification and destruction of hardware , software , data and network resources by anonymous persons ( The unauthorized use , access , modification and destruction of hardware, software, data, of network resources); 2. The unauthorized release of information; 3. The unauthorized copying of software; 4. Denying any end user access to his or her own hardware, software , data or network resources Using or conspiring to use computer or network resources to illegally obtain information or certain resources ( Using or conspiring to use computer or network resources to illegally obtain information or tangible property)

Related questions

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Computer crime or Cyber crime is crime that involves: a) Computer b) Network c) Both of Above d) None of These ✐ 386. Net crim

Last Answer : c) Both of Above

Description : . Computer Can be Involved in which of the following types of crime a. Homicide and sexual Assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Which of this is not a computer crime? C. Sabotage. D. Identification of dat

Last Answer : D. Identification of dat

Description : . Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Digital forensic applied both ……………. ? a. Analysis and response action b. Computer crime and civil action c. Criminal and civil action d. Regional and forensic action

Last Answer : c. Criminal and civil action

Description : IOCE is …………………..? a. Organization on computer evidence b. Organization on communication evidence c. Organization on country education d. Organization on crime evidence

Last Answer : a. Organization on computer evidence

Description : . Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Computers can be involved in which of the following types of crime? A. Homicide and sexual assault B. Computer intrusions and intellectual property theft C. Civil disputes D. All the above

Last Answer : D. All the above

Description : More subtle because you are not aware that you are running these macros (A) The purpose of copyright (B) Danger of macro viruses (C) Derivative works (D) computer-specific crime

Last Answer : (B) Danger of macro viruses

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses

Description : If, while searching a computer for evidence of a specific crime, evidence of a new, Unrelated crime is discovered, the best course of action is: a. Abandon the original search, and ... a warrant that addresses the new inquiry d. Continue with the original search, ignoring the new information

Last Answer : c. Stop the search and obtain a warrant that addresses the new inquiry

Description : Computers can be involved in which of the following types of crime? a. Homicide and sexual assault b. Computer intrusions and intellectual property theft c. Civil disputes d. All of the above

Last Answer : d. All of the above

Description : Crime through Internet includes: a) Telemarketing b) Internet fraud c) Identity Theft d) Credit Card account thefts e) All of the Above f) None of These

Last Answer : e) All of the Above

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : Net crime is criminal exploitation of the ___: a) Browsers b) Servers c) Internet d) None of These

Last Answer : c) Internet

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Which of the following statements about the Crime and Criminal Tracking Network System (CCTNS) is/are correct? 1. It will facilitate real time access of classified criminal data to the law enforcement authorities. 2. National Crime ... below- 1) 1 only 2) 2 only 3) Both 1 and 2 4) Neither 1 nor 2

Last Answer : 1) 1 only

Description : 0. Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have

Description : . Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : 9. Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : The digital evidence are used to establish a credible link between…… a. Attacker and victim and the crime scene b. Attacker and the crime scene c. Victim and the crime scene d. Attacker and information

Last Answer : a. Attacker and victim and the crime scene

Description : Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : The digital evidence is used to establish the credible link between … a. System, evidence and victim b. Attacker, victim, and crime scene c. Attacker, victim and case file d. Attacker, system and victim

Last Answer : b. Attacker, victim, and crime scene

Description : In which year, hacking became a practical crime and a matter of concern in the field of technology? a) 1971 b) 1973 c) 1970 d) 1974

Last Answer : c) 1970

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : The digital avoidance are use to stablish a credible link between (a) Attacker and victim and crime scene (b) Attacker and the crime scene (c) Victim and crime scene (d) Attacker and information.

Last Answer : (c) Victim and crime scene

Description : Cyber trails are advantageous because: A. They are not connected to the physical world. B. Nobody can be harmed by crime on the Internet. C. They are easy to follow. D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : D. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : Leaking your company data to the outside network without prior permission of senior authority is a crime. a) True b) False

Last Answer : a) True

Description : In obtaining a warrant, an investigator must convince the judge on all of the following Points except: a. Evidence of a crime is in existence b. A crime has been committed c. The owner or ... likely to have committed The crime d. The evidence is likely to exist at the place to be searched

Last Answer : c. The owner or resident of the place to be searched is likely to have committed The crime

Description : Cybertrails are advantageous because: a. They are not connected to the physical world. b. Nobody can be harmed by crime on the Internet. c. They are easy to follow. d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Last Answer : d. Offenders who are unaware of them leave behind more clues than they otherwise would have.

Description : The Digital evidence are used to established a credible link between………. A)Attacker and victim and the crime scene B)Attacker And information C)Either A or B D)Both A and B

Last Answer : A)Attacker and victim and the crime scene

Description : There are five acquaintances. One of them shot and killed one of the other five. Which man is the murderer? 1. Dan ran in the NY City marathon yesterday with one of the innocent men. 2. Mike ... last computers together. 9. The murderer is Jack's brother; they grew up together in Seattle. -Riddles

Last Answer : 1. Jack is not the murderer, because he is the brother of the murderer. 2. Dan can't be the murderer since he ran a marathon, and the murderer recently had his leg amputated, and wouldn't ... must also be alive since Jeff plans to install Ben's computer next week. This means that Jeff killed Mike.

Description : What is a computer cyber crime?

Last Answer : Cyber crimes are crimes that are perpetrated with the use of a computer. An example might be where someone uses a pc to illegally obtain someone else's personal information and then the "bad ... information to steal money from the victim. Simply, cyber crime is crime committed using a computer.

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : Computer class teaching discrimination based on gender is a case of a. Computer Crime b. Digital Divide c. Computer Equity d. All of the above

Last Answer : c. Computer Equity

Description : In Computer Crime, VIRUS stands fora. Vital Information Resouce Under Seize b.Very Important Resouce Under Seize c. Various Information Resouce Under Seize d. None of these

Last Answer : a. Vital Information Resouce Under Seize

Description : CART stands for _______ a. Computer Analysis and Request Time b. Computer Analysis and Response Time c. Crime Analysis and Response Time

Last Answer : b. Computer Analysis and Response Time

Description : ______________is a branch of forensic science encompassing the recovery and investigation of material found in digital devices often in relation to computer crime. a. Analog forensic b. Digital forensic c. Cyber forensic

Last Answer : b. Digital forensic

Description : Which of this is not a computer crime? A. e-mail harassment B. Falsification of data. C. Sabotage. D. Identification of data

Last Answer : D. Identification of data 

Description : More subtle because you are not aware that you are running these macros (the document opens and the application automatically runs); spread via email A. The purpose of copyright B. Danger of macro viruses C. Derivative works D. computer-specific crime

Last Answer : B. Danger of macro viruses