Cybercrime: Difference between revisions
Jump to navigation
Jump to search
imported>Mark Jones (Start Cybercrime article) |
imported>Mark Jones m (Minor edits) |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
Cybercrime is a form of crime involving [[computer|computers]] | Cybercrime is a form of crime involving [[computer|computers]], particularly when the crime is committed using the Internet or a [[computer network]]. | ||
Cybercrime can be sub-divided into two categories: | Cybercrime can be sub-divided into two categories: | ||
Line 11: | Line 11: | ||
* [[Malware]] | * [[Malware]] | ||
* [[Denial of service | * [[Denial of service]] | ||
Examples of cybercrime in the second category are: | Examples of cybercrime in the second category are: | ||
*[[ | *[[Cyberstalking]] | ||
*[[Fraud]] and [[identity theft]] | *[[Fraud]] and [[identity theft]] | ||
*[[Phishing|Phishing scams]] | *[[Phishing|Phishing scams]] | ||
*[[Information warfare]] | *[[Information warfare]] |
Latest revision as of 06:33, 6 April 2010
- The content on this page originated on Wikipedia and is yet to be significantly improved. Contributors are invited to replace and add material to make this an original article.
Cybercrime is a form of crime involving computers, particularly when the crime is committed using the Internet or a computer network.
Cybercrime can be sub-divided into two categories:
- Crime that targets computer networks or devices
- Crime that does not target computer networks or devices directly but utilises them in the commission of a crime
Examples of cybercrime in the first category are:
Examples of cybercrime in the second category are: