Computer Crime Essay

720 words - 3 pages

Society today is one of the electronic age. This is where most rely on computers and the information they bear in almost every aspect of their lives. Whether it is banking, heath care, emergency and government services, transportation, telecommunications, oil and gas distribution, power and water supply, it is something that society has become increasingly dependent upon (Taylor, Fritsch, Liedrbach, Holt, 2011, p.22). This is what our Nation’s infrastructure is made of now. Since the infrastructure is so dependent on the internet and electronics it makes the Nation’s vulnerability to cyberterrorism extremely high.
Cyberterrorism is a component of information warfare. Information warfare can be defined as actions that are taken to achieve significant advantage, objective or success over an adversary (p.19). So anything that can be manipulated in order to command or pressure the actions of a decision maker. Cyberterrorism is a specific intent against information, computer systems, computer programs, and data that can result against individuals as targets (p.20).
Areas of attack include infrastructure attacks that are designed to destroy a system that includes crucial data. Information attacks that are concentrated on destroying or adjusting the content of electronic files or computer systems. Technological facilitation when the use of cyber communication is used to deliver and coordinate plans for a terrorist attack, provoke an attack, or otherwise aid in the facilitation of terrorism. Promotion includes getting individuals by recruiting or soliciting others to their cause (p.21).
An infrastructure attack was made by a teenage back in 1997. He had hacked into the telephone system in Massachusetts causing it to be down for more than six hours. This phone service controlled was the main control tower for the airport fire department, airport security, and other departments. His actions caused flights to be canceled all over the country and a significant financial loss to the airliners and airport (p.23). This was just some teenager wanting something fun to do just think what a trained terrorist could do.
An information attack happen in1998 where individuals from all over decided to...

Find Another Essay On Computer Crime

Computer crime Essay

1297 words - 5 pages Computer Crime:The Crime of the FutureEnglish II6 April 1996Computer Crimes Explosive growth in the computer industry over the last decade has made newtechnologies cheaper and simpler for the average person to own. As a result, computersplay an intricate part in our daily lives. The areas in which computers affect life areinfinite, ranging from entertainment to finances. If anything were to happen to theseprecious devices, the world would

Computer Crime in society Essay

1458 words - 6 pages Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers

Computer Crime Investigations

771 words - 3 pages prevention programs are generated after hackers develop a new trick in cyber crime or computer crime. In addition some of the programs generating organizations have installed programs that can be used by the investigative agency. Discussion Board Some of the most important procedures used in collection of information to be used in a court of law include collecting live data from the RAMs images. Such live recovery of information can be

Computer Crime Investigations Forensics Research

546 words - 2 pages AbstractThe research on Computer Crime Investigations Forensics and Tools and Technology article has covered a short outline from Journal of Forensic Identification. Some parts of the research were interesting and elementary for a non-tech or tech savvy on providing reference on computer forensics and other related computer fields.Computer Crime Investigations Forensics ResearchIntroductionThe Research and Evaluation I - RES/341 course has

Types and Defences of Computer Crime

1561 words - 6 pages systems.Threats and risksThis section gives a brief description about the main threats and risks in the information systems area. The section is divided into three parts. First, threat of accidents and malfunctions are described. The second part describes the threat of computer crime and finally factors that may increase the risks are described. If nothing else is mentioned, the main material content is referred to Alter (D. Eric, 1999).Threat of

The Growing Threat of Computer Crime

3335 words - 13 pages Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to

Processes and Analyses for Computer Crime Investigations

713 words - 3 pages hacker comes up with a new trick in cyber crime or computer crime. In addition, some of the organizations who generate programs have installed some that can be used by investigative agencies. Some of the most important procedures used in collection of information that can be used in a court of law include collecting live data from the RAM’s images. Such live recovery of information can be collected from the F-Response, which can collect data

Computer Crime in the 90's

2338 words - 9 pages -related crime, computer network users and law enforcement officials most distinguish between illegal or deliberate network abuse versus behavior that is merely annoying. Legal systems everywhere are busily studying ways of dealing with crimes and criminals on the internet.TABLE OF CONTENTSPHONE FRAUD..........................................Pg1NETWORK BREAK-INS...........................Pg6INDUSTRIAL ESPIONAGE......................Pg7SOFTWARE

Computer Crime, hacking, phreaking and software piracy

1399 words - 6 pages It's the weekend, you have nothing to do so you decide to play aroundon your computer. You turn it on and then start up, you start callingpeople with your modem, connecting to another world, with people just likeyou at a button press away. This is all fine but what happens when youstart getting into other peoples computer files. Then it becomes a crime,but what is a computer crime really, obviously it involves the use of acomputer but what are

Computer Crime, discusses the proposition that computer crime has increased dramatically over the last 10 years.

1387 words - 6 pages IntroductionComputer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their contents are damaged, for example when vandals attack the computer itself, or when a 'computer virus' (a

The vulnerability of computerised accounting information systems to computer crime.

1509 words - 6 pages Abstract:With the information technology development day-by-day, Computerised Accounting Information System (CAIS) plays an increasingly significant role in the successful operation of today's business. Computerised Accounting Information System has been used more and more broadly and had as much impact on organisations, but the computer crime is also an important issue related to computerised accounting information system. As the expenditures

Similar Essays

Computer Crime Essay

1822 words - 7 pages Computer Crime Almost every major political candidate in recent history has used, and often exploited, on of the many facets of crime to attempt to convince American voters that they can feel secure and safe with the candidate at the leadership helm, coveted feelings in a tumultuous world. As a result, we have more policemen patrolling the streets, laws such as the death penalty and “three strikes your out”, proposed increases to defenses

Computer Crime. Essay

1239 words - 5 pages declining ethical standards more than any economic need. According to experts, gender is the only bias. The profile of today's non-professional thieves crosses all races, age groups and economic strata. Computer criminals tend to be relatively honest and in a position of trust: few would do anything to harm another human, and most do not consider their crime to be truly dishonest. Most are males: women have tended to be accomplices, though of

Computer Crime Essay

3116 words - 12 pages ;……………………………………………… 1A. computer crime:………………………………………………………....21. What is a computer crime?. ………………………&hellip

Computer Crime Essay

1950 words - 8 pages is currently in the process of. Computers are becoming apart of everyday activities, the threat is, this increases the chance of you becoming a victim of a form of computer crime [Khanna, 2005]. The notion of computer viruses or the thought that someone could hack into your computer from halfway around the world is certainly a major issue in the ideas of Computer Ethics. Where once physical security was the main problem, it appears that