Sunday, March 3, 2019
Computer Crime Essay Essay
calculating machine curse is an ongoing fall out that we continuously see, and a major difficulty with this is that just about mint do non realize the harm that electronic computer plague mess cause. Computer crime is also a deferral that continues to grow. This is based on the fact that in that respect argon galore(postnominal) an(prenominal) unalike perceptions about what computer crime is, and the harmful effects it can get down. Because there is a gap between traditional views of what cyber crime is and the substantial realities of these crimes, it is a wretched offense that will continue to go along.A major issue within this industry is the fact that citizens, law enforcement officials, prosecutors, and the g everywherenment dont put cyber crime at the top of their list of dangerous crimes is because the actual act of computer crime is not in itself viewed as creation dangerous. This is a traditional view of computer crime, and the book goes on to exempt th at, more stereotypical computer criminals argon non-threatening, socially challenged individuals, and 36.3% of officers believe that investigation of computer crime interferes with their ability to concentrate on traditional crimes (Britz, 7). Because police lead to not look too seriously at these crimes, the general world will form their own, similar opinions on the matter. This gives people an inaccurate judgment about the effects of cyber crime. In fact, computer crime can and many times is violent today.One area of computer crime that has develop particularly dangerous, especially for younger generations is cyber bullying. In recent classs, we obtain seen to a greater extent and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the United States v. Lori Drew. Lori was an older woman who affect to be a pueriled son and began to talk and soon by and by started an online relationship with a 14-year-old girl. The girl e ventually began to fall for the fake 16-year-old boy that Lori Drew created. After a series of conversations, their relationship ended with a message from Drew telling the girl that nobody actually like her and she should instead kill herself.Unfortunately, the 14-year-old girl, beingness highly impressionable and because of her feelings for this fake teenage boy, took the advice and ended up killing herself. A big issue we postulate seen with lawmakers imposing laws to prevent cyber crime is that, it issuch an advanced form of crime that many times it is unclear if there was an actual crime act and if so where/when it happened. In past situations, legislative bodies and judicial authorities have been slow to respond (Britz, 5). This slow response allows for those committing crimes in cyber space to head off punishment and lets these criminals continue their illegal operations. Another problem within this criminal sector is the gray area between, someone who accesses schoolin g without authorization and someone who is actually committing an act in cyberspace meant to harm someone or destroy suitablety (Webster).Another traditional view when it comes to cyber crime that is likely the most commonly thought, is that it would never happen to me. The medium American does not think that they could be a computer criminals targets. These people believe that because they arent trillionaires and instead an average income American, cyber criminals wont go after them.This unfortunately is not the case, and because these people arent taking the proper steps to protect themselves, they are becoming easier to target. In 2004, 54 million Americans were subject to email attacks by phishers looking to steal financial information from people. Roughly 4% of these 54 million people gave away their financials including reliance card numbers, addresses, phone numbers, etcthat is almost 1.7 million people In the year 2003, 1.2 billion dollars were generated in cyber attack s on average Americans. But computer criminals are not just using this phishing approach to steal information and money.They are practicing using key logging and spyware to steal passwords and other private information that can allow these people to go unnoticed while outlay your money. Despite the fact that we see more and more security be put in place to avoid these issues, it continues to happen because so many people in our society believe it will not happen to them. But what is instead happening, is more of these average people are being targeted because they are essentially making it easier for these criminals to steal their personal information. While these criminals for certain could steal more money from millionaires, going after these more average Americans is easier and safer (Wilson).With how technology dependent our society has become, we see more and morehacking crimes today. on that point even exist pigeonholings out there that have members from all over the world that collectively hack different websites. For example, Anonymous is probably the most well known hacking collective in the world. Parmy Olsons book We are Anonymous Inside the Hacker World, she discusses the history of the group and the attacks that they have done.This group would like us to believe that they are an activist group that seeks liberty for all people, but has hacked financial institutions such as PayPal, MasterCard and Visa. They want us to believe that they are independence fighters and simply believe in an unregulated Internet, but they tend to go after websites and companies that simply resist with their message. It is benevolent of a double-edged sword, because while they are preaching about freedom of speech, they then in turn go after people who disagree with their message. Olson even discusses the fact that the group went after her because of the books she was writing about this organization. commonwealth are definitely becoming more aware of the dangers of computer crime, many Americans still do not see the detrimental effects that cyber crime can have on society. These people that are blinded by traditional views of computer crime, have become the target of attacks. Their lack of preparations have allowed cyber criminals to go after them and gain money through their computer skills.whole kit and boodle CitedBritz, M. T. (2013). Computer Forensics and Cyber Crime and Introduction (3rd ed., Vol. 3). Upper Saddle River, NJ Pearson.Olson, Parmy. We argon Anonymous Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York Little, brownness and Company, .United States v. Lori Drew. (Feb. 2008) California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.Webster, S. C. (2013, June 20). Lawmakers Propose Cyber Crime Reforms.Retrieved from Raw floor website http//www.rawstory.com/rs/2013/06/20/lawmakers-propose-cyber-crime-reforms-inspired-by-aaron-swartz/Wilson, T. (n.d.). How Phishing Wo rks. Retrieved June 30, 2013, from How Stuff Works website http//www.howstuffworks.com/phishing.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment