We have collected more than 100 brand new call girls number and added it to a pdf for easy sharing.
To download 100+ Dhakaia Magi's number, complete the captcha and download it.

Download now








Loading Captcha...

If it doesn't load, please disable Adblock!






Computer Crime


Computer Crime
Computer crime refers to any crime that involves a computer may have been used in the commission of a crime, or it may be the target. Net rime   refers to criminal exploitation of the internet. Cybercrimes are defined as: “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modern telecommunication networks such as internet rooms, email, notice boards and mobile phones.
Crimes that primarily target computer networks or devices include
Computer viruses
Denial of service attacks
Malware (malicious code)  
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft
Information ware fare
Phishing scams
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons.
·     Harassment

Where as content may be offensive in a non –specific way harassment  directs obscenities and derogatory comments at specific way individuals focusing for example on gender, race, religion, nationality, sexual orientation.

Drug traffickers are increasingly taking advantage of the internet to sell there illegal substances through encrypted email and other internet technology.
Controls for preventing and detecting computer crime 
It would be nice to assume that everyone associated with business is honest. A totally honest workforce would certainly eliminate the need for controls to prevent crime.

Controls that allow only authorized people access to sensitive systems include the following:
Passwords: Use passwords that are long enough to be difficult to guess passwords should not be composed of simple words, names of relatives and so on.
Compartmentalization: Restrict users to the specific files and programs they have a job related need to access
Use of biometrics: Use of fingerprints, iris recognition, hand geometry and other new technologies for added measures of control.
Use of one time passwords: Use hardware or software that generates a new password for each access.
Automatic log off: Use this measure to prevent unauthorized access to the system when authorized users fail to log off.
Time day controls: Restrict personnel access to those times when they are supposed to be on duty.
So, when people are more attentive or more knowledge about the bad side of computer crime then they are more attentive to keep their computer easily. Because the computer crime is most neglected in our society




















An Assignment
on        
Computer Crime

For the Course titled Bangladesh Studies Society and Culture
[Course Code: HSS111(a)]
Submitted to:
Ms Layeqa Bashir
Assistant Professor, Sociology
Department of Basic Sciences and Humanities
University of Asia Pacific
                                                                                 
Submitted by:
Md. Mazedur  Rahman
Reg. no.12108126
Department of Electrical and Electronic Engeeneering
Spring 2012 Semester
Date of submission: 25-07-2012




No comments:

Post a Comment