Computer fraud

Computer fraud is a cybercrime and the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system.[1] In the United States, computer fraud is specifically proscribed by the Computer Fraud and Abuse Act, which criminalizes computer-related acts under federal jurisdiction. Types of computer fraud include:

Phishing, social engineering, viruses, and DDoS attacks are fairly well-known tactics used to disrupt service or gain access to another's network, but this list is not inclusive.

Notable incidents

The Melissa Virus/Worm

The Melissa Virus appeared on thousands of email systems on 26 March 1999. It was disguised in each instance as an important message from a colleague or friend.[3] The virus was designed to send an infected email to the first 50 email addresses on the users’ Microsoft Outlook address book. Each infected computer would infect 50 additional computers, which in turn would infect another 50 computers. The virus proliferated rapidly and exponentially, resulting in substantial interruption and impairment of public communications and services. Many system administrators had to disconnect their computer systems from the Internet. Companies such as Microsoft, Intel, Lockheed Martin and Lucent Technologies were forced to shut down their email gateways due to the vast number of emails the virus was generating. The Melissa virus is the most costly outbreak to date, causing more than $400 million in damages to North American businesses.

After an investigation conducted by multiple branches of government and law enforcement, the Melissa Virus/Worm was attributed to David L. Smith, a 32-year-old New Jersey programmer, who was eventually charged with computer fraud.[4] Smith was one of the first people ever to be prosecuted for the act of writing a virus. He was sentenced to 20 months in federal prison and was fined $5,000. In addition, he was also ordered to serve three years of supervised release after completion of his prison sentence. The investigation involved members of New Jersey State Police High Technology Crime Unit, the Federal Bureau of Investigation (FBI), the Justice Department’s Computer Crime and Intellectual Property Section, and the Defense Criminal Investigative Service.[5]

See also

References

  1. "Computer fraud". TheFreeDictionary.com. Retrieved 2015-12-29.
  2. "What is Computer Fraud? (with pictures)". wiseGEEK. Retrieved 2015-12-08.
  3. "Melissa Worm". avukati.org. Archived from the original on 2017-01-12. Retrieved 2016-06-15.
  4. Johanna Granville “Dot.Con: The Dangers of Cyber Crime and a Call for Proactive Solutions,” Australian Journal of Politics and History, vol. 49, no. 1. (Winter 2003), pp. 102-109.
  5. "Beste Antivirus Software van 2018 Onafhankelijk Vergelijken". De Beste Virusscanners & Antivirus software van 2018 Vergelijken (in Dutch). Archived from the original on 2018-02-17. Retrieved 2018-02-16.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.