Computer crime

From Wikipedia, the free encyclopedia

Jump to: navigation, search

Criminal law
Part of the common law series
Criminal elements
Actus reus · Causation · Concurrence
Mens rea · Intention · Recklessness
Criminal negligence · Ignorantia juris…
Strict, Corporate & Vicarious liability
Crimes against people
Assault · Battery · Robbery
Kidnapping · Pimping · Rape · Sexual offences
Manslaughter · Murder
Crimes against property
Criminal damage · Arson
Theft · Burglary · Deception
Crimes against justice
Obstruction of justice · Bribery
Perjury · Malfeasance in office
Inchoate offenses
Attempt
Conspiracy · Accessory
Criminal defenses
Automatism, Intoxication & Mistake
Insanity · Diminished responsibility
Duress · Necessity
Provocation · Self defence
Other areas of the common law
Contract law · Tort law · Property law
Wills and trusts · Evidence
Portals: Law · Criminal justice

Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category. Additionally, although the terms computer crime or cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used to facilitate the illicit activity.

Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.

Publié dans Non classé