Essay PreviewMore ↓
Originally, hacking was not such a feared word. It used to be used to describe computer geniuses, who were looking to reach the most complex concepts that the computer world had to offer. However, a few black sheep, and the word is now used in a negative manner. Hacking is now commonly defined as someone breaking into or “cracking” into a computer system and causing much harm to that system. It also relates to those who explore code and attempt to do harm or steal that code. While the true definition of a hacker is someone who loves to explore, can theorize and program easy and well, and just is a plain expert, the world has been turned off to this term because of the malicious acts of few. (home.planet.nl)
Another type of computer crime is called, the “Trojan Horses”. This term refers to someone pretending to do a seemingly useful and desirable task, while in actuality they are performing a deceiving and deceptive act. An example of this is someone writing a seemingly harmless program, while the program really contains harmful code and data. There have even been programs that were “Trojan Horses”. These programs were supposed to search and find viruses, but the program turned out to be very harmful to those who used it. (home.sandiego.edu)
Viruses are commonly called “Trojan Horses”, as they usually disguise their true harm. Viruses are defined as a piece of programming code that can have devastating effects to one’s computer. Viruses are so dangerous because they can automatically be sent to another computer without one actually sending the program. Viruses most commonly come in an e-mail or attachment, a downloadable file, or on a CD-ROM or diskette. Most of the time, the source of the virus does not even know the virus is contained in the file or program. Some viruses must lie in wait until the computer does something to trigger the code into action.
How to Cite this Page
"The Problem of Computer Crime." 123HelpMe.com. 22 Jan 2019
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- White-collar crime, specifically computer crime, is becoming more popular as computers become more readily available. Crimes using computers and crimes against computers are usually committed without fear of being caught, due to the detachment of the offender from the victim. Computer crime is defined as, “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.”(1).... [tags: Internet Crime Essays]
2353 words (6.7 pages)
- As our technology has greatly advanced over the past 50 years, our businesses, people, and its governments have been greatly affected by this new technology. With the vast capabilities of computers, the Internet, storage capability, and the manipulation of data, today's world has been changed forever. Although the benefits greatly outweigh the disadvantages, unless we take a more serious look at this new technology, more people will be hurt, from businesses, families, individuals, and most importantly, our children.... [tags: Internet Crime Essays]
2369 words (6.8 pages)
- Computer crime is defined as "a criminal act that has been committed. With a computer as the principle tool"(Judson, 30). These computer criminals are people with advanced knowledge of operating systems, phone systems, and other computer related devices. Some computer criminals break into other people’s computers, and steal data, these criminals are known as hackers. Yet others might make a phone call without even paying for it, or receive phone services that they did not pay for, these people are known as phreakers.... [tags: Internet Crime Essays]
796 words (2.3 pages)
- In today’s society computers are everywhere, but when someone thinks of a computer they think of it as a way to make life easier. This is true computers have made our life a lot easier and some times harder. The area that computer have improved our life the most is in communication, now we can write talk and hold a video conference anywhere in the world in real time. However, with as many good things that computers bring, they also bring many bad things too. Just as there is, crime in the real world there is also crime in the computer world, most of it taken place on the Internet.... [tags: Internet Crime Essays]
1462 words (4.2 pages)
- Computer Crime: A Increasing Problem ABSTRACT Computer crimes seem to be an increasing problem in today's society. The main aspect concerning these offenses is information gained or lost. As our government tries to take control of the information that travels through the digital world, and across networks such as the InterNet, they also seem to be taking away certain rights and privileges that come with these technological advancements. These services open a whole new doorway to communications as we know it.... [tags: essays research papers fc]
2564 words (7.3 pages)
- ... Fight Cybercrime However, we know that the Congress has the highest upsurges on high-tech crimes. The Internet lets offender obtain a rapid profit with somewhat small jeopardy to be convicted. It is very easy for offenders to mislead individuals, hide proofs along with steal property. Although computer crimes have not been extensively extended in Ukraine yet, but cases they have are already fixed (Gutsaluk, n.d.). On November 16 thru the 20 of 2001, Ukrtelecom has more than 700 computers in addition to 10 of servers ended up with a virus (Gutsaluk, n.d.).... [tags: Computer crime, Crime]
1226 words (3.5 pages)
- Computer Misuse Act 1990 The Computer Misuse Act 1990 provides several offences involving the use of computers. In 2006 the Act was amended by sections 35-38 of the Police and Justice Act 2006. Discuss the offences under the Computer Misuse Act 1990 and the 2006 amendments. Your discussion must include critical assessment of the Act in light of new computer technologies and the realities of computer crime investigative methodologies. INTRODUCTION We all know that hacking has been all over the place, practically it’s been going as long as the Internet has been alive.... [tags: Personal computer, Computer, Crime]
1096 words (3.1 pages)
- ABSTRACT Billions of dollars in losses have already been discovered. Billions more have gone undetected. Trillions will be stolen, most without detection, by the emerging master criminal of the twenty-first century--the computer crime offender. Worst of all, anyone who is computer literate can become a computer criminal. He or she is everyman, everywoman, or even every child. CHAPTER 1 INTRODUCTION To first understand computer crime one must understand first what crime is. According to Diana Kendall, "crime is a behavior that violates criminal law and is punishable with fines, jail or other sanctions" (Kendall 1999; 161).... [tags: Technology]
1071 words (3.1 pages)
- Computer Crime: Prevention and Innovation Since the introduction of computers to our society, and in the early 80¡¦s the Internet, the world has never been the same. Suddenly our physical world got smaller and the electronic world set its foundations for an endless electronic reality. As we approach the year 2000, the turn of the millenium, humanity has already well established itself into the ¡§Information Age.¡¨ So much in fact that as a nation we find our selves out of a service economy and into an information based economy.... [tags: essays research papers fc]
3089 words (8.8 pages)
- Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers, cyber porn and various other crimes that have a drastic affect on the society and the institutions that each of us hold to keep our global society running.... [tags: essays research papers]
1457 words (4.2 pages)
File infectors include program files and when the program is opened the virus is opened up into the computer. File infector viruses also include those sent in an e-mail as an attachment or in a program. When the e-mail is opened or downloaded, the virus then is opened to that computer. (home.planet.nl)
System or boot record infectors are viruses that infect code that is executed from a certain part of a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. Common examples of this are to receive a disk, from an either innocent or guilty source, that contains a boot disk virus. The disk can than be loaded automatically by the computer if left in when turned on. This can cause you to lose access to some things on your computer for several days. (home.planet.nl)
Macro viruses are common but are generally harmless to one’s computer. An example is one getting into Microsoft Word and just adding in words or phrases that are unwanted. (home.planet.nl)
The last type of well known computer crime that I will talk about is called a “worm”. A worm is a virus that can self replicate itself. It does not mess with any files, but it does reside in the active memory and continue to duplicate itself. Worms can use parts of the operating system that are usually invisible to the normal computer user. These worms can continually duplicate themselves until they slow or halt other tasks of a computer. This is usually the time when a worm is noticed. Worms can also be very harmful in networks. A worm can travel independently to a network and clog it up to the point of destruction. It then just gets up and moves to another network that becomes another victim of its destruction. (home.planet.nl)
Why Computer Crime is a Problem:
The criminals involved in the area of computer crime are not like the profile of any other crime in the United States. Surprisingly, computer criminals tend to have no prior record of crime. Computer criminals also tend to be responsible, honest people in a position of trust. In fact, many of the businesses that fall victim to a computer crime, find out that it was one of their employees that was the perpetrator of the act. Most computer criminals are male, but the number of women as accomplices and actual perpetrators is growing in number. They range in ages from fourteen to thirty. These criminals are usually very bright and know a lot about computers and are willing to challenge themselves in the technological world. Generally, these computer criminals almost represent “normal” people. They do not seem the type that would want to harm or hurt something. There is no profile of a computer criminal because the profile stretches way too far. (electronicreferences.com)
Computer crime is becoming a big problem in our world today. Many of these crimes affect our jobs, our money, our community and our lives. Many people are being affected by fraud over the internet. There is a chance they can get their credit card number stolen or even their social security number, which could lead to the loss of their identity. It is not only just viruses messing up how we use the internet. People are stealing money, software, benefits, and much more. Many governmental agencies, such as Police Departments and Fire Departments, have important databases that are crucial for protection.
Computer Crime as a Major Problem to Businesses:
One of the major victims of the increasing wave of computer crime is businesses. Computer crime can have devastating effects on businesses. Businesses are using information technology for all aspects of business. They use it for many of their day to day activities. This increase in the use of information technology has raised the risk of having complete devastation due to a computer crime. These computer crimes can inhibit a business from performing its day to day activities. Thus, causing the business it infects to lost a substantial amount of money in a short time.
With computer crime becoming an increasing problem in society, it is important to report computer attacks. It is said that many businesses go without reporting a virus or worm in their system. They are either too embarrassed to think that someone actually got through their system or they just do not feel like going through the hassle. Nevertheless, these criminals are able to stay free. What many of these businesses do not realize is that they are leaving this person to commit perhaps a more devastating crime once again. They also don’t realize that the perpetrator may have left a back door to get back into the system that he has already once tampered with. In a way, they are leaving their selves open to future attacks. This is why it is so important to report even the smallest incident to the authorities. Although, sometimes it is impossible to detect these computer crimes and they may go unnoticed and unreported.
Businesses that are not prepared or do not have the security to protect against these computer crimes might find their selves out of business. From the year 2000 to 2001, the estimated loss of businesses due to computer crimes increased by 113 million dollars. It averages to around 2 million dollars per business that was affected by a computer crime. This is no small number. Two million dollars can be devastating to a business. Not only was this, but only around ten percent of the actual businesses affected by computer crime were surveyed due to lack of reporting these crimes.
Ecommerce businesses are feeling much of this blow. We have all heard of what happens when someone breaks into an ecommerce business database or information system. Very important information, such as credit card numbers and social security numbers, can be stolen or lost. Many businesses were forced to close down just because so much important information was stolen. These businesses also work very close with each other. This leaves room for multiple businesses to easily be affected by one virus or worm. (doc.advisor.com)
Even after all this evidence, it still seems that businesses have a misconception on how big this problem actually is. Businesses have yet to address security problems within their own systems. Many flaws and openings exist, yet businesses are doing little or nothing to protect them selves from computer crime.
Some say that businesses have a misconception on who is doing the security breaching. Many have stereotyped hackers into mislead young teens, who do not have the intelligence or the resources to actually break into a sophisticated system. Yet, many of these perpetrators of computer crime seem to be very intelligent and have the patience to wait it out. Their hacking methods seem organized and planned out. This does not seem like the work of children. This is stuff done by professionals.
Businesses must learn to take these attacks seriously. If they choose to keep their systems out of date and keep their security out of date, the cost and volume of these attacks will continue to increase. Businesses will have to wait until something devastating happens to realize that this is a big problem and they need to do something about it before they find them selves out of business.
Suggested Solutions to Problems of Computer Crime:
First off, businesses need to accept the fact that computer crime is a problem. Businesses need to realize that this problem is not just going to go away. They are the ones that need to help them selves. Businesses can do this by getting ahead of computer crime and strike against it before they get struck.
Businesses need to establish a system of security. Everything in their system, internally and externally, needs to be checked and secured. Businesses need to set up a secure system that is as close to fail proof as possible. If businesses want to stay afloat and keep a competitive advantage, they must first make sure they do not have a surprise attack that puts them on the street.
These information systems need to be tested during development. A Penn State researcher has discovered that testing during the development of information systems can save business’ lots of money and hassles later. This can help managers keep an eye on security and also help them to fix the mistakes that just may cost them a lot of grief or even their business, later. (sciencedaily.com)
Another thing businesses must try to do is to report any known attack immediately. Even though they may lose a little face, it is better than losing your entire business. Many risks remain when these crimes go unreported. It is very important that we catch these people the first time. That way we can help prevent a future case that may even come back to the same business it hit once before. Again, businesses must get ahead of these computer criminals.
As computer crime continues to become a bigger and more costly issue today, greater measures need to be taken to prevent them. These crimes are looked at as just white collar crimes, yet they cost people and businesses the most money out of any other crime. The punishment should fit the crime. This needs to be recognized as a problem and any business that wants to succeed should take this seriously.
Businesses must take the measures needed to prevent computer crime. All these types of computer crimes are more common than we think. Businesses that use information technology and online communication as an everyday part of their business need to pay close attention to this issue. It is important to stop these criminals and keep business’ and people's money with the people that actually earned it.
“Computer Crime Dossier.” Computer Crime. 1 November 2003
“Computer Crime Increasing.” Computer Crime Increasing. Electronic References. 1 November 2003 http://www.electronicreferences.com/view.php/Technology/701.HTM>
“Definition of a Hacker.” 1 November 2003 < http://home.planet.nl/~faase009/Ha_hacker.html>
Froehlick, Joseph. Pinter, Edward. Witmeyer, John. “Computer Viruses: Making the time fit the crime.” November 2003 < http://www.fmew.com/archive/virus/>
Hartley, Bruce. “Why is Computer crime on the rise?” Advisor Magazine. 1 November 2003
Horrocks, Craig. Davidson, Aaron. “Eliminate computer crime by identifying weaker areas.” 1 November 2003 < http://www.clendons.co.nz/library/articles/computer_crime.htm>
“Testing Information Systems During Development Will Prevent Problems.” Science Daily.
1 November 2003 <http://www.sciencedaily.com/releases/2003/09/030918093222.htm>
“What are some common computer crime.” Types of Computer Crime. 1 November 2003
“Virus.” searchSecurity.com. 1 November 2003
Panko, Raymond. Corporate Computer and Network Security. New Jersey: Prentice Hall, 2004.
Parker, Donn B. Managers guide to Computer Security. Virginia: Reston, 1981.