Describe what 'techno-crime' is, and describe 'eight' examples, identifying in each case whether it would constitute an act of sabotage, and 'why'?

1 Answer | Add Yours

Top Answer

herappleness's profile pic

M.P. Ossa | College Teacher | (Level 1) Distinguished Educator

Posted on

Techno crime refers to any illegal activity performed using technology as a conduit. It includes unethical treatment of secured information, hacking, identity theft, and using the Internet communication tools for abusive purposes.

These actions are conducive to sabotage:

1. Using stored and encrypted information for personal purposes- An example would be you being an IT person have access to social security numbers, passwords, etc. Opening this information for your benefit is sabotaging your clients.

2.Identity theft- Using someone's personal information to conduct transactions or pretending to be someone to obtain that person's information sabotages security.

3.Cyberbullying- Using e-mails or chatrooms, newsgroups or other communication methods to introduce libelous or vicious attacks on others sabotages the right of a dignified way of life in others.

4.Stealing-Obtaining ATM information and removing funds from bank accounts under the premise that you have the information as an IT person sabotages against the validity of the profession.

5.Hacking into medical files- Nowadays doctors are younger and have access to a myriad of social networks where they may feel free to discuss private information. Disclosing information of this type is illegal and sabotages the privacy of the patient.

6.Spreading viruses- Those kids that sit back to create viruses are creating cyberterrorism in a way and sabotaging the systems of all people, as well as entering government agencies and infiltrating in important databases.

7.Phishing= Hacking into other people's emails to spread any form of message, e-commerce, or advertisements against the person's will sabotages against their privacy and that of others.

8.False links=If I run a children's blog and someone accesses my blog, he or she can use any of my child friendly pictures to link them to porn sites, or other illegal sites for malicious purposes and get a lot of people in trouble by sabotaging their security.

We’ve answered 317,950 questions. We can answer yours, too.

Ask a question