0% found this document useful (0 votes)
121 views

Computer As A Weapon - CINTCYBER

This document discusses how computers can be used as weapons to commit cybercrimes. It explains that while computers make our lives more convenient by storing and processing data, they can also be used by criminals to commit identity theft, fraud, and invade privacy. Many cybercrimes are committed online by individuals and groups from around the world, sometimes for financial gain. Criminals try to access private information by stealing usernames and passwords in order to infiltrate systems and steal data, which can then enable further crimes. Due to these threats, it is important to be aware of what information one accesses online through personal computers.

Uploaded by

Ranna Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views

Computer As A Weapon - CINTCYBER

This document discusses how computers can be used as weapons to commit cybercrimes. It explains that while computers make our lives more convenient by storing and processing data, they can also be used by criminals to commit identity theft, fraud, and invade privacy. Many cybercrimes are committed online by individuals and groups from around the world, sometimes for financial gain. Criminals try to access private information by stealing usernames and passwords in order to infiltrate systems and steal data, which can then enable further crimes. Due to these threats, it is important to be aware of what information one accesses online through personal computers.

Uploaded by

Ranna Flores
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

INTRODUCTION TO

HOLY ANGEL COLLEGE OF CRIMINAL JUSTICE


CYBERCRIME INVESTIGATION UNIVERSITY EDUCATION & FORENSICS

Flores, Ranna Gaele P.


BS Criminology
CM-401

Computer As a Weapon

A computer is a type of electronic equipment that manipulates information, often known as


data. It is capable of storing, retrieving, and processing data. You may already be aware that a
computer may be used to type documents, send email, play games, and surf the Internet. It can also
be used to edit or create spreadsheets, presentations, and even videos. The use of computers makes
our lives easier, faster, and most of all, convenient. The relevance of computers can be understood
and analyzed by observing a revolution in offline and online commerce, online education, online
communication, and internet banking. All of our daily activities rely on online services and goods.
The computer transformed our lives two decades ago, and it is now a necessity to use a computer in
daily life in order to function.

However, computers can also use as a weapon for committing cybercrimes. Some of these
are fraud, identity theft, or invasion of privacy. Cybercrime has grown in relevance as the computer
has become important to every area, including commerce, entertainment, and government. Many
cybercrimes are available and practiced online by individuals and groups from all over the world.
These may be begun by governmental intelligence or by private individuals seeking financial gain
through elaborate plans to exploit others. Criminals attempt to gain access to internet portals by
using someone else's access or personal information. This could result in the theft of this
information, fraud crimes, infiltration of business data, and a variety of other dangers. Software can
be used to copy usernames and passwords in order to get access to private or protected information.
This enables these people to infiltrate systems, websites, databases, and other parts of a firm or the
internet. When information is stolen and copied, it can be used to perform a variety of crimes. As a
result of these acts, it is critical to be aware of what emails and data are being accessed via personal
computer. Both the internet and private intranets may be vulnerable to cyber-attacks .

Personal computers have been utilized as information portals and numerous modes of


communication with people in the electronic age. However, there are numerous people all around
the world who have used these tools to commit a wide range of crimes. These crimes span from the
theft of information from a person's home computer to the use of corporate secrets as a competitive
advantage, as well as fraud and espionage. Digital crimes are diverse and might be difficult to
prosecute successfully. Without adequate regulations in place, these breaches might go on for
decades with little to no repercussions.

You might also like