a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Areas where computers are used as instruments of crime:

  1. Hacking: Unauthorized access to computer systems for malicious purposes, such as stealing sensitive data.
  2. Phishing: Using deceptive emails or websites to trick individuals into providing personal information.
  3. Spreading Malware: Deliberately distributing viruses, worms, or trojans to compromise computer systems.
  4. Identity Theft: Using computers to illegally access personal information and impersonate someone else.

Areas where computers are targets of crime:

  1. Data Theft: Stealing confidential data stored on computers.
  2. Denial of Service (DoS) Attacks: Overloading a system with traffic to make it unavailable to users.
  3. Unauthorized Data Modification: Altering data without permission, which can affect business operations.
  4. Hardware Theft: Stealing physical computer equipment like servers or laptops.