Cyber Crime Essay

1154 words - 5 pages

Jason PadgettCCJS 390 6380 Cyber Crime and SecurityMcKinnon09/06/2014The word hacker is thrown around as the go-to word, which infinitely describes a computer professional, or even sometimes an enthusiast as an internet criminal. To society, hackers are generally projected to be techno nerds that sit in their basements, computing away and finding ways to penetrate the cyber defenses of large companies. What people do not know is that the world of Information Technology uses different terms to describe types of hackers.Much like a movie, or a television show, there are good people and bad people in the world of hacking. Black hats; hackers that mean to harm, steal files, software - even cause damage. White hats; educated professionals that are mostly employed by companies to prevent cyber-attacks, and set up defense systems. They do battle in an invisible world that most people are unaware of; anticipating each other's moves and finding loopholes in systems.Some time ago, a Scotland born man named Gary McKinnon successfully penetrated what the United States government describes as the National Aeronautics and Space Administration; he essentially hacked NASA. Not everyone is capable of performing such a task, yet this longtime computer geek, as he describes himself, was able to bypass government technology and defenses to access confidential files. Sensitive information that a stalwart government defense system obviously protected for a vast number of reasons (Hacker McKinnon turns search expert. (n.d.). Retrieved September 7, 2014). Mr. McKinnon, a supposed 20 year professional in the Information Technology business accessed NASA's systems over a span of about thirteen months, all the while sitting at his girlfriend's aunt's house in London. In what seems like an unlikely story by just reading numerous articles on the internet, multiple sources state McKinnon had been a long-term hacker and computer enthusiast; obviously not just an Information Technology professional. (Hacker McKinnon turns search expert. (n.d.). Retrieved September 7, 2014)As anyone can imagine, hacking NASA can come with serious consequences, and when someone at the National Aeronautics and Space Administration discovered the intrusion, McKinnon's connection was promptly terminated. Certainly, a world power government would keep the highest tier of technology available to prevent what I would consider reckless hacking - that is obvious. Yet McKinnon himself describes his attempts at hacking as downloading software from the internet, all the while using Microsoft Windows.Anyone that knows anything about computers - especially hacking - knows this seems just a little farfetched, yet sustainably possible given the right circumstances and situation. Personally, I find the fact that anyone using a Windows system could even penetrate a government computer, simply because what has been described is he essentially used other software, and did not create his own. Using other tools for...

Find Another Essay On Cyber Crime

Cyber-Crime is a Serious Problem Essay

2338 words - 9 pages often isn’t effective because so many of them operate it from overseas. Many of them are from Russia, China, Pakistan, and India. According to Cyber Security article “In May, a Russian convicted of unleashing 4,000 computer viruses received slap on the wrist— a suspended two-year jail term and a year’s probation” (22). The FBI and other law enforcement agencies spend countless time to prevent cyber-crime; however, everybody should come together to

cyber crime Essay

829 words - 4 pages had written testimony on the situation. The laptop was never found. This is not the first time that NASA has had security breaches to sensitive information, in fact, NASA has had 5408 intrusions of sensitive information from 2010 the 2011. These breaches have cost the agency millions of dollars. Steven Misul of CNet.com says, “The agency was the target of 47 cyber-attacks known as advanced persistent threats (APTs), which are executed by well

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will

Unsecured Privacy Settings, Cyber Bullying, and Facebook Crime

896 words - 4 pages frequently coincide with the collision of personalities. Unsecured privacy settings and cyber bullying accentuate concerns regarding face book crimes. As stated in the Encarta World English Dictionary the terminology privacy is the freedom from the observation, intrusion or attention of others whilst unsecured is construed as not protected against electronic eavesdropping. Therefore unsecured privacy settings are the non protection against

This paper describes the crime of cyber crime and how to prevent it from happening to you.

1661 words - 7 pages Cyber Identity TheftIdentity theft is a crime that causes damages to a person that can last a lifetime. One of the ways peopleT's identity is being stolen is through the use of the internet. Cyber Identity Theft is becoming very popular and is a problem that every person that uses the internet needs to be well aware of. For most people once it has happened it is too late to for them to recover from the losses. People are damaged financially, as

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages always find other ways to bypass security and continue with their crimes.Cybercrime has evolved from simple viruses decades ago to complex scams, frauds, piracy, hacking and cyber bullying. Hackers are constantly trying to break into private and personal data for personal gain, and attempt to find any exploits that will allow them access to these networks. This could be a single individual or the collaboration of an organized group and includes

Cyber Bullying

984 words - 4 pages , but what about when it is done anonymously online. Cyber bullying has become the new trend for kids to terrorize each other. According to a report by the National Crime Prevention Council (2007) forty-three percent of teens say they have been victims of cyber bullying within the past year.New technology has come with new means for youth to bully each other. Bullying used to take place primarily on school, play yards and neighborhoods. Teens are

cyber something

1059 words - 5 pages victim committed suicide or the bully destroys the person's reputation. Most of a cyber bully's actions are not reported to the law, so the bully gets away with it without any consequences. Cyber bullying happens the most on social media sites. These include Facebook, Twitter, Instagram, and YouTube. In conclusion, cyber bullying is a serious crime. There exist certain actions to prevent cyber bullying. The best way to prevent cyber bullying is to either get off the internet or don't be a cyber bully yourself.

The Necessary Inclusion of Cyber-bullying Legislation in Canada

2421 words - 10 pages In Canada, the emergence of bullying has risen to new heights as advancements in technology have allowed almost anybody to conduct harmful acts against another person while maintaining vast amounts of anonymity (Shariff, Cyber-Bullying: Issues and solutions for the school, the classroom and the home, 2008; Li, Cyberbullying in Schools: A Research of Gender Differences, 2006; Shariff & Jaishankar, Cyber Bullying: A Transnational Perspective, 2009

The Dangers of Cyber-Terrorism

1529 words - 6 pages In the future, cyber crime will become the leading threat to the safety and security of the American people. Experts on cyber crime agree that cyber crime is an issue that needs to be focused on more in-depth because the wide-spread use of computers by the global economy has made the use of computers and internet vital to everyday life (Siegel, 2009; FBI, 2011). There are 3 major types of cyber crime which includes: cyber fraud, cyber vandalism

Cyber Security Controls As a Public Good

2486 words - 10 pages Overview Society today is plagued with crime that is difficult to combat, constantly changing, and has no borders; this type of crime is called cyber-crime. The United States of America is attacked on a daily basis by cyber criminals both foreign and domestic. The crimes committed involve fraud, identity theft, theft of proprietary trade secrets, and even theft of national secrets. The 2009 Internet Crime Report indicates there were 336,655

Similar Essays

Cyber Crime And Cyber Law Essay

2705 words - 11 pages factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008). Cyber crime has become an important concern for not only the business firms

Cyber Criminals: Cyber Crime And Cyberstalking Essay

1503 words - 6 pages years” (James). Hackers not only target companies, but governments as well. In a single year the U.S. government had 360 million attempts to hack their networks. Due to the hazard of losing government information, President Obama initiated a move against cyber-crime, and while it is a start, there is more planned to the effort (James). Hacking has caused companies an untold amount of money. In 2000, a Denial-Of-Service attack was launched by a 15

Staying Safe From Cyber Crime Essay

2077 words - 8 pages at the same time keep friends in contact with one another. While these website serve their purposes, they serve an entirely different purpose for a hacker who can utilize said public info. On another note, cyber crime is not always just about financial gain; there are criminals that seek to utilize social network websites to lure underage users. In an article which analyzed Social Networking - “the Good, the Bad and the Ugly” by

Bad Effects Of The Internet: Cyber Crime

903 words - 4 pages Nowadays with the growth of internet usage among people, there are always bad effect of internet. One of the problems that always occur in internet is cybercrime or scam. According to Brittanica.com cyber-crime also can be define as computer crime which the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy