Friday, June 7, 2019

Computer Crime Essay Essay Example for Free

Computer criminal offense Essay EssayComputer crime is an ongoing issue that we continuously see, and a major puzzle with this is that most race do non realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is ground on the circumstance that there are more(prenominal) distinct perceptions about what computer crime is, and the harmful effects it can realise. Because there is a open frame between traditional views of what cyber crime is and the actual realities of these crimes, it is a culpable offense that will continue to happen. A major issue within this industry is the fact that citizens, law enforcement officials, prosecutors, and the government dont put cyber crime at the top of their list of dangerous crimes is because the actual act of computer crime is not in itself viewed as being dangerous. This is a traditional view of computer crime, and the book goes on to explain that, many stereotypical computer crimina ls are non-threatening, socially challenged individuals, and 36.3% of officers accept that investigation of computer crime interferes with their ability to concentrate on traditional crimes (Britz, 7). Because police tend to not look too seriously at these crimes, the normal public will form their own, similar opinions on the matter. This gives community an inaccurate belief about the effects of cyber crime. In fact, computer crime can and many times is violent today.One area of computer crime that has become particularly dangerous, especially for younger generations is cyber bullying. In recent years, we have seen more and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the United States v. Lori Drew. Lori was an older woman who pretended to be a teenaged boy and began to talk and soon after started an online relationship with a 14-year-old girl. The girl pointtually began to fall for the fake 16-year-old boy that Lori Dre w created. After a series of conversations, their relationship ended with a message from Drew telling the girl that nobody actually liked her and she should instead kill herself.Unfortunately, the 14-year-old girl, being super impressionable and because of her feelings for this fake teenage boy, took the advice and ended up killing herself. A big issue we have seen with lawmakers imposing laws to prevent cyber crime is that, it issuch an innovational form of crime that many times it is unclear if there was an actual crime committed and if so where/when it happened. In past situations, legislative bodies and judicial governing have been slow to respond (Britz, 5). This slow response allows for those committing crimes in cyber space to avoid punishment and lets these criminals continue their illegal operations. Another problem within this criminal sector is the gray area between, someone who accesses tuition without authorization and someone who is actually committing an act in cy berspace meant to harm someone or abate property (Webster).Another traditional view when it comes to cyber crime that is probably the most commonly thought, is that it would never happen to me. The average American does not think that they could be a computer criminals targets. These people believe that because they arent millionaires and instead an average income American, cyber criminals wont go after them.This unfortunately is not the case, and because these people arent taking the proper steps to protect themselves, they are becoming easier to target. In 2004, 54 million Americans were subject to email attacks by phishers facial expression to steal financial information from people. Roughly 4% of these 54 million people gave away their financials including credit card numbers, addresses, phone numbers, etcthat is almost 1.7 million people In the year 2003, 1.2 billion dollars were generated in cyber attacks on average Americans. But computer criminals are not just using this ph ishing approach to steal information and money.They are practicing using key logging and spyware to steal passwords and other private information that can allow these people to go unnoticed while spend your money. Despite the fact that we see more and more security be put in place to avoid these issues, it continues to happen because so many people in our bon ton believe it will not happen to them. But what is instead happening, is more of these average people are being targeted because they are fundamentally making it easier for these criminals to steal their personal information. While these criminals certainly could steal more money from millionaires, going after these more average Americans is easier and safer (Wilson).With how technology dependent our society has become, we see more and morehacking crimes today. There even exist meetings out there that have members from all over the world that collectively hack different websites. For example, Anonymous is probably the most w ell known hacking collective in the world. Parmy Olsons book We Are Anonymous Inside the Hacker World, she discusses the history of the group and the attacks that they have done.This group would like us to believe that they are an activist group that seeks freedom for all people, but has hacked financial institutions such as PayPal, MasterCard and Visa. They call for us to believe that they are freedom fighters and simply believe in an unregulated Internet, but they tend to go after websites and companies that simply disagree with their message. It is soft of a double-edged sword, because while they are preaching about freedom of speech, they then in turn go after people who disagree with their message. Olson even discusses the fact that the group went after her because of the books she was writing about this organization.People are definitely becoming more aware of the dangers of computer crime, many Americans still do not see the detrimental effects that cyber crime can have on society. These people that are blinded by traditional views of computer crime, have become the target of attacks. Their lack of preparations have allowed cyber criminals to go after them and gain money through their computer skills.Works CitedBritz, M. T. (2013). Computer Forensics and Cyber Crime and Introduction (3rd ed., Vol. 3). focal ratio Saddle River, NJ Pearson.Olson, Parmy. We Are Anonymous Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York Little, Brown and Company, .United States v. Lori Drew. (Feb. 2008) California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.Webster, S. C. (2013, June 20). Lawmakers Propose Cyber Crime Reforms.Retrieved from Raw Story website http//www.rawstory.com/rs/2013/06/20/lawmakers-propose-cyber-crime-reforms-inspired-by-aaron-swartz/Wilson, T. (n.d.). How Phishing Works. Retrieved June 30, 2013, from How Stuff Works website http//www.howstuffworks.com/phishing.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.