- 8 Marks
Question
a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.
Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)
Answer
Areas where computers are used as instruments of crime:
- Hacking: Unauthorized access to computer systems for malicious purposes, such as stealing sensitive data.
- Phishing: Using deceptive emails or websites to trick individuals into providing personal information.
- Spreading Malware: Deliberately distributing viruses, worms, or trojans to compromise computer systems.
- Identity Theft: Using computers to illegally access personal information and impersonate someone else.
Areas where computers are targets of crime:
- Data Theft: Stealing confidential data stored on computers.
- Denial of Service (DoS) Attacks: Overloading a system with traffic to make it unavailable to users.
- Unauthorized Data Modification: Altering data without permission, which can affect business operations.
- Hardware Theft: Stealing physical computer equipment like servers or laptops.
- Tags: Computer Crime, Cybercrime, Data Theft, Fraud, Hacking, Information security, Information Systems
- Level: Level 1
- Topic: Information Systems Development and Security
- Series: NOV 2015
- Uploader: Dotse