What are Major Forms of Computer Crime?
There are many ways of committing computer crime. Computer crime includes computer system attack and the motivations to do so. Computer crime must involve a computer and is in most cases against the computer or use of the computer for committing the crime. Computer crimes are classified as military and intelligence attacks, business attacks, financial attacks, terrorist attacks, grudge attacks and thrill attacks. The objective of military attacks are mainly is to obtain secrets and restricted information from law enforcement or military research sources. Business attacks have focus on obtaining organizations confidential information. Financial attacks are carried out to obtain money and services while the terrorist attacks aim at disrupting normal life and instill fear. The thrill attacks are carried out for the fun of it (Moore, 2011).
Current ways that police and other officials are using to track the criminals and enforce the laws.
There have been efforts to create standardized international policies on tracking computer crimes. The officials practice International Corporation. They have realized that tracking other terrorist activities such as money laundering requires some methodological tracing of transactions through electronic fund transfers to determine patterns and behavior that could suggest illegal activities. Many bilateral treaties have been created in countries for the purpose of sharing intelligence and cooperating in the tracking of computer crimes through the internet. The officials have also created uniform international laws for computer related crimes. A new department of internet police has been created to help in curbing the wide spread of computer crimes, as well. They are in charge of internet policing and fight any type of crime they may detect online. The department of justice has also come up with acts to implement strategies in combating computer crimes worldwide. The F.B.I has also formed a cyber crime division that investigates computer crimes especially sexual crimes (Toren, 2003).
Alltech communications is susceptible to different types of computer crime. It can be susceptible to hackers who use computers to asses to some sensitive information. There is also a possibility of someone being able to access identity and information about projects and some sensitive things such as password information. Data transfer is also likely to occur in Caltech communications through taping of phone lines and use of the internet. It is also susceptible to malicious computer programs such as computer virus and computer worm. It is possible for crimes to be carried out through the Alltech comm. Network routers and steal private information (Toren, 2003).
References
Moore, R. (2011). Cybercrime : investigating high-technology computer crime. Cincinnatti: Anderson.
Toren, P. (2003). Intellectual Property and Computer crimes. New York: Law Journal press.