Computer crime is an act carried out by an informed computer user, sometimes referred to as a hacker, who illegally navigates or steals the private information of a company or individual.
Cybercrime encompasses a spectrum of activities. At one extreme are crimes that involve fundamental violations of personal or corporate privacy, such as attacks on the integrity of information stored in digital repositories and the use of illegally obtained digital information to blackmail a company or individual.
Also at this end of the spectrum is the growing crime of identity theft. In the middle of the spectrum are transaction-based crimes such as fraud, child pornography trafficking, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the offender hides in the relative anonymity offered by the Internet.
Another part of this type of crime involves individuals within corporations or government bureaucracies who deliberately alter data for profit or political purposes. At the other end of the spectrum are crimes that involve attempts to disrupt the actual functioning of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism, that is, using the Internet to cause public disturbances and even death. Cyberterrorism focuses on the use of the Internet
by non-state actors to affect the economic and technological infrastructure of a nation. Since the attacks of September 11, 2001, public awareness of the threat of cyberterrorism has increased dramatically. 
Different Types of Computer Crimes
- Identity Theft
- Denial of Service Attack
Ways to survive such computer crimes
- Keep everything up to date
Many breaches happen because Most major computer companies issue regular updates to protect against newly emerging vulnerabilities. We can keep also up to date our systems every time.
- Use a strong, unique password
Don’t repeat our passwords on different sites, and change your passwords regularly. Make them complex. A password management application can help to keep our passwords locked down.
- Enable multi-factor authentication
In many situations, websites require users to not only provide a strong password, but also to enter separate code for an application, text message, or email message when logging in. It’s an extra step, and it’s not perfect, but includes several Factor Authentication makes it much more difficult for a hacker to get into your accounts. Whenever we have the option, enable multi-factor authentication, particularly for crucial logins like bank and credit card accounts. You might also consider getting a physical-digital key that can connect to your computer or smartphone for an even more advanced level of protection.
- Encrypt and back up your most important data
If we can, encrypt the data stored on your smartphone and computer. If a hacker copies your files, all you get is gibberish, rather than, for example, your address book and financial records. This often involves installing software or changing system settings. Some manufacturers do this without users knowing, which helps improve safety for everyone.
|||M. A. Dennis, “Britannica,” Britannica, [Online]. Available: https://www.britannica.com/contributor/Michael-Aaron-Dennis/4346.|