Friday, January 11, 2019
Computer Crime Essay Essay
figurer nuisance is an ongoing away bring out that we continuously check, and a major problem with this is that closely muckle do non realize the accidental injury that com flummoxer law-breaking crumb cause. Computer plague is also a box that continues to grow. This is based on the fact that at that place be many different perceptions active what calculator horror is, and the aggrieveful personal set up it can aim. Because in that respect is a cattle ranch between conventional intellections of what cyber plague is and the material realities of these crimes, it is a wrong offense that go out continue to happen.A major eject within this industry is the fact that citizens, honor enforcement officials, prosecutors, and the government dont put cyber crime at the top of their dip of dangerous crimes is because the actual act of estimator crime is not in itself viewed as being dangerous. This is a traditional view of computing device crime, and the book goes on to formulate that, many stereotypical figurer criminals atomic number 18 non-threatening, soci all(prenominal)y challenged individuals, and 36.3% of officers remember that investigation of computer crime interferes with their ability to concentrate on traditional crimes (Britz, 7). Because police tend to not side too seriously at these crimes, the normal public pull up stakes form their own, akin(predicate) opinions on the matter. This gives mountain an inaccurate ruling almost the effects of cyber crime. In fact, computer crime can and many time is violent today.One bea of computer crime that has create particularly dangerous, oddly for younger generations is cyber boss around. In recent years, we have seen much and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the joined States v. Lori Drew. Lori was an older woman who pretended to be a teenaged boy and began to clack and soon by and by started an on line relationship with a 14-year-old miss. The girl eventually began to fall for the hedge 16-year-old boy that Lori Drew created. After a series of conversations, their relationship ended with a message from Drew telling the girl that nobody real liked her and she should sort of kill herself.Unfortunately, the 14-year-old girl, being highly waxen and because of her feelings for this fake teenage boy, took the advice and ended up killing herself. A big issue we have seen with lawmakers imposing laws to prevent cyber crime is that, it is such an advanced form of crime that many times it is unclear if there was an actual crime committed and if so where/when it happened. In past situations, legislative bodies and legal authorities have been slow to do (Britz, 5). This slow response seizes for those committing crimes in cyber space to avoid punishment and lets these criminals continue their ineligible operations. An other(a) problem within this criminal sector is the gray area between, somebody who accesses information without authorization and someone who is actually committing an act in cyberspace meant to harm someone or destroy situation (Webster).Another traditional view when it comes to cyber crime that is probably the most commonly thought, is that it would never happen to me. The average American does not think that they could be a computer criminals targets. These people believe that because they arent one million millionaires and or else an average income American, cyber criminals wint go after them.This unfortunately is not the case, and because these people arent victorious the proper steps to protect themselves, they are becoming easier to target. In 2004, 54 million Americans were subject to email attacks by phishers feel to steal pecuniary information from people. round 4% of these 54 million people gave away their financials including credit card numbers, addresses, rally numbers, etcthat is almost 1.7 million people In the year 2003, 1.2 billion dollars were generated in cyber attacks on average Americans. But computer criminals are not just development this phishing entree to steal information and money.They are practicing using key logging and spyware to steal passwords and other private information that can allow these people to go unnoticed temporary hookup spending your money. Despite the fact that we see more and more security be put in place to avoid these issues, it continues to happen because so many people in our society believe it will not happen to them. But what is instead happening, is more of these average people are being targeted because they are essentially qualification it easier for these criminals to steal their personal information. While these criminals surely could steal more money from millionaires, going after these more average Americans is easier and safer (Wilson).With how applied science dependent our society has become, we see more and more  shortening crimes today. There even be mathematical classs out there that have members from all over the world that collectively hack different websites. For example, unnamed is probably the most well known hacking collective in the world. Parmy Olsons book We Are Anonymous Inside the jade World, she discusses the history of the group and the attacks that they have done.This group would like us to believe that they are an activist group that seeks freedom for all people, however has hacked financial institutions such as PayPal, MasterCard and Visa. They want us to believe that they are freedom fighters and entirely believe in an unregulated Internet, but they tend to go after websites and companies that patently disagree with their message. It is kind of a ambiguous sword, because while they are preaching about freedom of speech, they then in bring go after people who disagree with their message. Olson even discusses the fact that the group went after her because of the books she was writi ng about this organization.People are definitely becoming more awake(predicate) of the dangers of computer crime, many Americans still do not see the detrimental effects that cyber crime can have on society. These people that are blinded by traditional views of computer crime, have become the target of attacks. Their lack of preparations have allowed cyber criminals to go after them and gain money through their computer skills.Works CitedBritz, M. T. (2013). Computer Forensics and Cyber offensive and Introduction (3rd ed., Vol. 3). Upper Saddle River, NJ Pearson.Olson, Parmy. We Are Anonymous Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York Little, dark-brown and Company, .United States v. Lori Drew. (Feb. 2008) California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.Webster, S. C. (2013, June 20). Lawmakers hint Cyber Crime Reforms.Retrieved from Raw Story website http//www.rawstory.com/rs/2013/06/20/lawmakers-prop ose-cyber-crime-reforms-inspired-by-aaron-swartz/Wilson, T. (n.d.). How Phishing Works. Retrieved June 30, 2013, from How Stuff Works website http//www.howstuffworks.com/phishing.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment