This website uses cookies to ensure you have the best experience. Learn more

Cyber Crime Essay

829 words - 4 pages

When I think of computer crimes, it is no longer simply a person stealing a computer, or laptop that does not belong to them. It is much more than that. Computer crimes are much more problematical and deceitful than just stealing a computer. It now has turned into a mass hijacking of information. People now break into networks stealing very sensitive information. Some of this information includes business documents, people’s personal information, and money. These unauthorized attacks can harm networks, systems, and files, which could damage an agency or a business. Not even governments are immune to these information commandeering. Government agencies such as NASA are targeted on a regular basis.
In March 2011 NASA, space agency had an employee’s laptop stolen with sensitive data on it. The laptops information on hard drive was not encrypted. Leaving the laptop completely vulnerable and the contents of it. It just so happens, that this particular laptop had extra sensitive data on. The laptop had algorithms on it that controlled the international space station as well as employee’s social security numbers on it. According to CBSDC, “theft of an unencrypted NASA notebook computer resulted in the loss of algorithms used to command and control the International Space Station”. (CBSDC, 2012) NASA’s chief inspector Paul K Martin had written testimony on the situation. The laptop was never found.
This is not the first time that NASA has had security breaches to sensitive information, in fact, NASA has had 5408 intrusions of sensitive information from 2010 the 2011. These breaches have cost the agency millions of dollars. Steven Misul of CNet.com says, “The agency was the target of 47 cyber-attacks known as advanced persistent threats (APTs), which are executed by well-resourced individuals or group’s intent on stealing or modifying information”. (Steven Misul, 2012) At the time, government agencies encrypted 54 percent of their information; but NASA has only encrypted one percent leaving their mobile devices and laptops vulnerable to such attacks in the future.
During the years of 2010 and 2011, NASA lost about seven million total with all the cyber-attacks and lost hardware. This is only the amount that was reported. There is most likely been a lot more than that and probably totaling in the hundreds of millions. In the case of the laptop that had the space station algorithms on it, there was an investigation. I do not believe that there was a huge public outcry against NASA....

Find Another Essay On cyber crime

Cyber crime on the rise Essay

2393 words - 10 pages information over to the criminal never knowing their intent. These crimes are known as cybercrime or computer crime and they are becoming prevalent in the 21st century by taking crime new levels. The definition of cybercrime according to the Federal Bureau of Investigation (FBI) is a crime that is committed from a computer or from the internet in which criminals use for financial gain, reputation, or cause fear (2010). With cyber crime the computer can

Staying Safe from Cyber-Crime Essay

2077 words - 8 pages at the same time keep friends in contact with one another. While these website serve their purposes, they serve an entirely different purpose for a hacker who can utilize said public info. On another note, cyber crime is not always just about financial gain; there are criminals that seek to utilize social network websites to lure underage users. In an article which analyzed Social Networking - “the Good, the Bad and the Ugly” by

Crime in the Cyber Realm

1032 words - 5 pages , which bans websites and content that are illegal in China. According to Paul Wiseman of USA Today, “If an Internet user in China searches for the word ‘persecution,’ he or she is likely to come up with a link to a blank screen that says ‘page cannot be displayed’” (n.d.). The Code theory of cyber crime allows for a multifaceted approach to cyber security, where each involved entity maintains its own relevant level of cybersecurity. In practice

Bad Effects of The Internet: Cyber Crime

903 words - 4 pages Nowadays with the growth of internet usage among people, there are always bad effect of internet. One of the problems that always occur in internet is cybercrime or scam. According to Brittanica.com cyber-crime also can be define as computer crime which the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy

Cyber-Crime is a Serious Problem

2338 words - 9 pages often isn’t effective because so many of them operate it from overseas. Many of them are from Russia, China, Pakistan, and India. According to Cyber Security article “In May, a Russian convicted of unleashing 4,000 computer viruses received slap on the wrist— a suspended two-year jail term and a year’s probation” (22). The FBI and other law enforcement agencies spend countless time to prevent cyber-crime; however, everybody should come together to

Cyber Crime Investigations: The Obstacles for Law Enforcement Officials

1578 words - 6 pages Because the wide world of technology has developed at such an astounding pace, there are many problems for victims as well as investigators of cyber crime and computer-related crimes. First, we must familiarize ourselves with the definitions of cyber crime and computer-related crime. For this paper, we will define cyber crime as the use of a computer as a tool to commit a crime or as a crime committed where a computer is the target. We will

cyber crime and its use in modern times - university - assigment

1300 words - 6 pages them and it mill make easier the judiciary to convict the offender. Another difference between traditional crime and cyber-crime is the violence or force use to commit them. The majority of traditional crimes such as rape, burglary, murder… include the use of violence or force that will result is physical abuse or trauma of the victim. in cybercrime no force is required because the criminal only uses the victim’s identity to steal from them

Unsecured Privacy Settings, Cyber Bullying, and Facebook Crime

896 words - 4 pages frequently coincide with the collision of personalities. Unsecured privacy settings and cyber bullying accentuate concerns regarding face book crimes. As stated in the Encarta World English Dictionary the terminology privacy is the freedom from the observation, intrusion or attention of others whilst unsecured is construed as not protected against electronic eavesdropping. Therefore unsecured privacy settings are the non protection against

This paper describes the crime of cyber crime and how to prevent it from happening to you

1661 words - 7 pages Cyber Identity TheftIdentity theft is a crime that causes damages to a person that can last a lifetime. One of the ways peopleT's identity is being stolen is through the use of the internet. Cyber Identity Theft is becoming very popular and is a problem that every person that uses the internet needs to be well aware of. For most people once it has happened it is too late to for them to recover from the losses. People are damaged financially, as

Actions taken by the Australian Government to combat cyber crime

1182 words - 5 pages always find other ways to bypass security and continue with their crimes.Cybercrime has evolved from simple viruses decades ago to complex scams, frauds, piracy, hacking and cyber bullying. Hackers are constantly trying to break into private and personal data for personal gain, and attempt to find any exploits that will allow them access to these networks. This could be a single individual or the collaboration of an organized group and includes

Computer Crime

1796 words - 8 pages A major part of the world today revolves around technology and cyberspace. Almost every day one will use a type of computer in some way, whether it is work related or if it is for personal use such as social networking. Another thing occurring on a daily basis is criminals committing either trivial or major crimes; so it is not hard to imagine that these two actions would start to syndicate into one. Cyber-crime is defined as “unauthorized use

Similar Essays

Cyber Crime Essay

840 words - 4 pages and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitating the intervention of the government through enactment of policies that govern the usage of computer technology. According to Richardson (2008, p 3), cyber crime has grown to catastrophic levels thus posing a challenge to global security. Consequently, besides cyber crime affecting the security of

Cyber Crime Essay

1154 words - 5 pages Jason PadgettCCJS 390 6380 Cyber Crime and SecurityMcKinnon09/06/2014The word hacker is thrown around as the go-to word, which infinitely describes a computer professional, or even sometimes an enthusiast as an internet criminal. To society, hackers are generally projected to be techno nerds that sit in their basements, computing away and finding ways to penetrate the cyber defenses of large companies. What people do not know is that the world

Cyber Crime And Cyber Law Essay

2705 words - 11 pages factor (Spinello, 2000). A high percentage of population is using computers in the Australia, United States as well as other developed nations. These people are much more connected with the world by the use of internet. They are using the computer for fun, business, e-commerce, e-marketing, etc.; thus, it has become an essential part of life and daily routine (Wall, 2008). Cyber crime has become an important concern for not only the business firms

Cyber Criminals: Cyber Crime And Cyberstalking Essay

1503 words - 6 pages years” (James). Hackers not only target companies, but governments as well. In a single year the U.S. government had 360 million attempts to hack their networks. Due to the hazard of losing government information, President Obama initiated a move against cyber-crime, and while it is a start, there is more planned to the effort (James). Hacking has caused companies an untold amount of money. In 2000, a Denial-Of-Service attack was launched by a 15