Featured Post

‘My Swordhand is Singing’ Develops Essay

This tale is based around a little town called Chust, in Romania. Chust is a little seventeenth century town encompassed by an enormous and ...

Sunday, September 22, 2019

COOP WORK TERM ANALYSIS REPORT Paper Example | Topics and Well Written Essays - 2000 words - 1

COOP WORK ANALYSIS REPORT - Term Paper Example The number of people who are trying to commit crimes against kids through the internet, blogs, social media and other sites is rapidly growing. The cause of this is the use of technology amongst our children grows day by day. Software piracy; this is a case whereby someone copies software for personal use or distribution. This happens with programs that are not protected with malware protection, encryption keys or supplementary types of anti- piracy methods. These anti- piracy tools are, however, not perfectly foolproof since the Cyber criminals develop advanced ways of meandering with them. Anti- piracy methods will thus constantly be improved. Child pornography and Minor Assault; this is whereby an individual knowingly distributes, sells and buys child pornography via the internet. Child prostitution is also part of this since criminals have been using chat rooms to tempt minors into sexual encounters that are illegal. Computer Virus Transmission: a virus transmitter, who in this case is the criminal, creates a deadly virus that infects computers and causes them to function improperly. These viruses might also cause the computer to run irritating programs, or get access to a victim’s personal data. ‘Malware’ is the common name that is given to this software. Frequent types of malware are spyware, Trojan horses and Adware. Victims can without knowing download these programs via pop-up windows, websites and emails. Money Fraud; In this case, a victim is made to believe that he will be given money or some other valuable thing. â€Å"Phishing† scams entail creating replica emails while pretending to be genuine businesses like credit companies or banks that probe the victim to ascertain personal data. Computer Industry Espionage; this is the stealing trade secrets, or spying of individuals via technological ways for blackmail, corporate

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.