You should be familiar with information [data: information with no context, for example, a listing of students with serial numbers, is data. When these figures represent the placement in a 100 meter race, the data becomes an info] and computer misuse [the information stored electronically is easier to get]; using software [applications: a more general term used to describe an application or program], which might not be reproduced without permission. The consequences results in Software piracy [piracy: the purchase, benefit from the use or making changes to copyright material without prior consent]; and hacking, and can result in data corruption; deliberate or accidental.
Kinds of computer misuse investigation
Misuse of computers and communication could be in Various forms:
Hacking is when an unauthorized person uses a system [Network: A set of connected computers]and an Internet modem [modem: a bit of hardware which connects the computer to the Internet] to get safety passwords or other security of information stored on another computer. Hackers sometimes use applications hacking tools and frequently aim some websites on the Internet. Their manipulation isn’t merely restricted to private networks but also to government and corporate computer networks.
Misuse of data and unauthorized transfer or backup
Copying and illegally moving information quickly and easily online utilizing computers and big storage devices like hard disk drives [HDD: a device used to store large volumes of data, on a tough disk drive], memory sticks [memory stick: a thumb-sized mobile storage device mainly used for transferring files between computers] and DVDs [Digital Versatile Disc- used to store data, by way of instance, a film]. Personal data, business research and written work, such as books and textbooks can’t be reproduced without permission of the copyright holder.
This also applies to the copying of movies and music to circulate the Internet with no copyrights [copyright: Indicates the founder of an original piece of work and control of this novel, distribution, and adaptation] authorization holder. This is a widespread abuse of the two computers and the Internet that overlooks the copyrights rules and regulations.
A huge part of indecent material and pornography can be found through the Internet and can be stored in electronic form. There have been a number of cases of substances that are classified as prohibited, or that reveal illegal acts, found stored on computers, liable to prosecution for possession of these substances.
Identity and financial misuses
This topic covers manipulation of stolen credit card numbers to obtain goods or services on the Internet, and using computers in fiscal frauds. These can vary from complex well thought deceptions to simple programs, such as printing of counterfeit currency utilizing colour printers.