A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Friday, May 16, 2014

What is cyber theft?

Cyber theft can be defined as the use of computer networks for criminal profits, Infringement of copyright, identity theft and internet securities fraud are example of cyber theft.

Many computer crimes involve the theft of money or goods or intellectual property. In the majority of cases, they are “inside jobs” that involve unauthorized network entry and fraudulent alternation of computer databases to cover the tracks of the employees involved.

This category includes cyber intrusion, but is also sometimes used to refer to any criminal theft, where a computer system or the internet is used as a means of perpetrating the crime.

One of the examples was involve the use of internet, such as the widely publicized theft of $11 million from Citibank in late 1994, Russian hacker Vladimir Levin and his accomplices in St. Petersburg used the Internet to electronically break into Citibank’s mainframe systems in New York.

They then succeed in transferring the funds from several Citibank accounts to their own account at banks in Finland, Israel, and California.

The new computer based technology allows criminals to operate in a more efficient and effective manner.

Cyber thieves now have the luxury of remaining anonymous, living in any part of the planet, conducting their business during the day, working the evening, working alone or in a group, and at the same time reaching a much wider number of potential victims than ever before.

In most case, the scope of such financial losses is much larger than the incidents reported. Most companies don’t reveal that they have been targets or victims of computer crimes.
What is cyber theft?

The Most Popular Posts

  • Genghis Khan, born Temujin in 1162 on the Mongolian steppes, remains one of history's most transformative figures. As the founder of the Mongol Empire, the...
  • Mangosteen juice, derived from the tropical fruit mangosteen, is renowned for its exceptional antioxidant content. Antioxidants are vital compounds that ne...
  • Secondary metabolites are an extraordinary array of organic compounds synthesized by plants that go beyond basic physiological processes like growth, dev...