• Nie Znaleziono Wyników

143 УДК 004.056 Ілів М. – ст. гр. СБ-21 Паперовський Б. – ст. гр. СБ-21 Бутрин С. – ст. гр. СБ-21 Тернопільський національний технічний університет імені Івана Пулюя

N/A
N/A
Protected

Academic year: 2021

Share "143 УДК 004.056 Ілів М. – ст. гр. СБ-21 Паперовський Б. – ст. гр. СБ-21 Бутрин С. – ст. гр. СБ-21 Тернопільський національний технічний університет імені Івана Пулюя"

Copied!
1
0
0

Pełen tekst

(1)

VІІІ Всеукраїнська студентська науково - технічна конференція "ПРИРОДНИЧІ ТА ГУМАНІТАРНІ НАУКИ. АКТУАЛЬНІ ПИТАННЯ"

143

УДК 004.056

Ілів М. – ст. гр. СБ-21

Паперовський Б. – ст. гр. СБ-21

Бутрин С. – ст. гр. СБ-21

Тернопільський національний технічний університет імені Івана Пулюя

КІБЕР ЗЛОЧИННІСТЬ

Науковий керівник: викладач кафедри Української та іноземних мов

Джиджора Л. А.

Iliv M.

Paperovskiy B.

Butryn S.

Ternopil Ivan Pul’uj National Technical University

CYBER CRIMES

Supervisor: Dzhydzhora L.A.

Ключові слова:технологія,злочин,безпека,хакер.

Keywords: technology, crime, security, hacker.

In the current world, it’s almost impossible to imagine that someone can live without computers. Computers have become an electronic device of almost every day use for individuals of every age. They are essential in almost all the business dealings that are made nowadays. The most that any industry has gained from the discovery of the computers is the business industry because of its nature. Computers have gained significance as they have improved the efficiency and productivity of work done. Large amounts of information in industrial and business sectors as well as in the personal lives are stored on computers.

That is why computer crime is becoming ever prevalent in our society. More and more, companies and individuals rely on the services and resources provided through networks and computers. Companies may be dependent on the data to conduct business, while individuals may store information that is important to their personal or work-related activities. Due to this, it becomes vital that steps are taken to protect computer systems and the data that’s stored on them.

Alternatively referred to as cyber crime, is an act commonly performed by a

knowledgeable computer user, sometimes referred to as a hacker that illegally browses or

steals a company's or individual's private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.

Cytaty

Powiązane dokumenty

The Coca-Cola formula is The Coca-Cola Company's secret recipe for Coca- Cola syrup that bottlers combine with carbonated water to create "Coca-Cola" soft drinks.. As

This technology may help you in a large number of different situations, for example doctor can monitor condition of your health with smartwatch sensors, can keep track of you

In a short period of time V.M.Glushkov’s crew has not only developed the principle of linking computers ”Ural - 1” with the telegraph communication channels, but they have

In the history of video game development such stages can be distinguished : age of video arcade games, first generation consoles, mainframe games, second generation consoles,

Depending on the degree of measurement, determinants of economic security are divided into two groups: external and internal factors.. External factors are factors which

In a year at the exhibition dedicated to flexible screens in Canada, the company Human Lab demonstrated the first flexible smartphone.. At the end of 2013, Samsung released the

Eventually he not only gave us incandescent lighting but also gave electrical lighting mechanism containing necessary elements to make incandescent light safe, economical

Біржа — організований торгівельний майданчик, на якому відбуваєтьсягуртова торгівля товарами або цінними паперами у вигляді стандартизованих біржових угод. В наш