Wednesday, July 17, 2019

Computer Crime Essay Essay

reckoner umbrage is an on termination publication that we continuously gossip, and a major problem with this is that near battalion do not realize the impose on _or_ oppress that com localiseer evil force out cause. Computer law-breaking is also a box that continues to grow. This is based on the fact that thither ar many different perceptions just round what reckoner annoyance is, and the vituperateful effect it can surrender. Because there is a kerfuffle between conventional ensures of what cyber criminal offense is and the echt realities of these crimes, it is a felon offense that depart continue to happen.A major egress within this industry is the fact that citizens, justness enforcement officials, prosecutors, and the government dont put cyber crime at the top of their heel of dangerous crimes is because the actual act of electronic computer crime is not in itself viewed as being dangerous. This is a traditional view of computer crime, and the boo k goes on to relieve that, many stereotypical computer criminals be non-threatening, soci wholey challenged individuals, and 36.3% of officers regard that investigation of computer crime interferes with their ability to concentrate on traditional crimes (Britz, 7). Because police tend to not spirit too seriously at these crimes, the everyday public provide form their own, quasi(prenominal) opinions on the matter. This gives race an inaccurate article of faith about the set up of cyber crime. In fact, computer crime can and many generation is violent today.One bea of computer crime that has constitute particularly dangerous, in particular for younger generations is cyber hector. In recent years, we have seen more than and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the unite States v. Lori Drew. Lori was an older woman who pretended to be a teenaged boy and began to blabber and soon later started an onlin e relationship with a 14-year-old missy. The girl eventually began to fall for the dissimulator 16-year-old boy that Lori Drew created. After a series of conversations, their relationship ended with a message from Drew telling the girl that nobody genuinely liked her and she should or else kill herself.Unfortunately, the 14-year-old girl, being highly pliable and because of her feelings for this fake teenage boy, took the advice and ended up killing herself. A big issue we have seen with lawmakers imposing laws to prevent cyber crime is that, it issuch an advanced form of crime that many times it is unclear if there was an actual crime committed and if so where/when it happened. In past situations, legislative bodies and juridic authorities have been slow to react (Britz, 5). This slow response put ups for those committing crimes in cyber put to keep down punishment and lets these criminals continue their felonious operations. An opposite problem within this criminal secto r is the gray area between, soul who accesses information without authorization and someone who is actually committing an act in cyberspace meant to harm someone or destroy situation (Webster).Another traditional view when it comes to cyber crime that is probably the most commonly thought, is that it would neer happen to me. The average American does not think that they could be a computer criminals targets. These batch believe that because they arent megaires and kinda an average income American, cyber criminals wint go after them.This alas is not the case, and because these people arent victorious the proper steps to protect themselves, they are becoming easier to target. In 2004, 54 million Americans were subject to email attacks by phishers looking to steal fiscal information from people. around 4% of these 54 million people gave away their financials including credit card numbers, addresses, cry numbers, etcthat is almost 1.7 million people In the year 2003, 1.2 bil lion dollars were generated in cyber attacks on average Americans. But computer criminals are not just apply this phishing advance to steal information and money.They are practicing using key logging and spyware to steal passwords and other private information that can allow these people to go unnoticed enchantment spending your money. Despite the fact that we see more and more security be put in place to avoid these issues, it continues to happen because so many people in our society believe it will not happen to them. But what is instead happening, is more of these average people are being targeted because they are essentially make it easier for these criminals to steal their personal information. While these criminals sure enough could steal more money from millionaires, going after these more average Americans is easier and safer (Wilson).With how applied science dependent our society has become, we see more and more galley slaveing crimes today. There even last assembla ges out there that have members from all over the world that collectively hack different websites. For example, unidentified is probably the most well known hacking collective in the world. Parmy Olsons book We Are Anonymous Inside the ward-heeler World, she discusses the history of the conclave and the attacks that they have done.This group would like us to believe that they are an activist group that seeks freedom for all people, just has hacked financial institutions such as PayPal, MasterCard and Visa. They want us to believe that they are freedom fighters and hardly believe in an unregulated Internet, but they tend to go after websites and companies that alone dissent with their message. It is kind of a ambiguous sword, because while they are preaching about freedom of speech, they then in romp go after people who disagree with their message. Olson even discusses the fact that the group went after her because of the books she was writing about this organization.People are definitely becoming more conscious(predicate) of the dangers of computer crime, many Americans still do not see the detrimental effects that cyber crime can have on society. These people that are blinded by traditional views of computer crime, have become the target of attacks. Their lack of preparations have allowed cyber criminals to go after them and gain money done their computer skills.Works CitedBritz, M. T. (2013). Computer Forensics and Cyber horror and Introduction (3rd ed., Vol. 3). Upper Saddle River, NJ Pearson.Olson, Parmy. We Are Anonymous Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York Little, embrown and Company, .United States v. Lori Drew. (Feb. 2008) California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.Webster, S. C. (2013, June 20). Lawmakers image Cyber Crime Reforms.Retrieved from Raw Story website http//www.rawstory.com/rs/2013/06/20/lawmakers-propose-cyber-crime-reforms-inspired-by-aa ron-swartz/Wilson, T. (n.d.). How Phishing Works. Retrieved June 30, 2013, from How Stuff Works website http//www.howstuffworks.com/phishing.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.