Wednesday, May 22, 2019

Computer Crime Essay Essay

Computer crime is an ongoing issue that we continuously see, and a major trouble with this is that most wad do non realize the harm that computer crime can cause. Computer crime is also a niche that continues to grow. This is ground on the accompaniment that there are galore(postnominal) distinct perceptions about what computer crime is, and the harmful effects it can view. Because there is a spread between traditional views of what cyber crime is and the actual realities of these crimes, it is a outlaw offense that will continue to happen.A major issue within this industry is the fact that citizens, law enforcement officials, prosecutors, and the government dont put cyber crime at the top of their list of dangerous crimes is because the actual act of computer crime is not in itself viewed as being dangerous. This is a traditional view of computer crime, and the book goes on to explain that, many stereotypical computer criminals are non-threatening, socially challenged indi viduals, and 36.3% of officers regard that investigation of computer crime interferes with their ability to concentrate on traditional crimes (Britz, 7). Because police tend to not look too seriously at these crimes, the widely distributed public will form their own, similar opinions on the matter. This gives muckle an inaccurate belief about the effects of cyber crime. In fact, computer crime can and many times is violent today.One area of computer crime that has become particularly dangerous, especially for younger generations is cyber bullying. In recent years, we have seen to a greater extent and more suicides related to cyber bullying then ever before. An example of this can be seen in the case of the United States v. Lori Drew. Lori was an older woman who pretended to be a teenaged boy and began to talk and soon after started an online relationship with a 14-year-old girl. The girl even sotually began to fall for the fake 16-year-old boy that Lori Drew created. After a ser ies of conversations, their relationship ended with a message from Drew telling the girl that nobody actually liked her and she should instead kill herself.Unfortunately, the 14-year-old girl, being super impressionable and because of her feelings for this fake teenage boy, took the advice and ended up killing herself. A big issue we have seen with lawmakers imposing laws to prevent cyber crime is that, it issuch an advance(a) form of crime that many times it is unclear if there was an actual crime committed and if so where/when it happened. In past situations, legislative bodies and judicial politics have been slow to respond (Britz, 5). This slow response allows for those committing crimes in cyber space to avoid punishment and lets these criminals continue their illegal operations. Another problem within this criminal sector is the gray area between, someone who accesses reading without authorization and someone who is actually committing an act in cyberspace meant to harm so meone or exterminate property (Webster).Another traditional view when it comes to cyber crime that is probably the most commonly thought, is that it would never happen to me. The average American does not think that they could be a computer criminals targets. These people believe that because they arent millionaires and instead an average income American, cyber criminals wont go after them.This unfortunately is not the case, and because these people arent taking the proper steps to protect themselves, they are becoming easier to target. In 2004, 54 million Americans were subject to email attacks by phishers looking for to steal financial information from people. Roughly 4% of these 54 million people gave away their financials including credit card numbers, addresses, phone numbers, etcthat is almost 1.7 million people In the year 2003, 1.2 billion dollars were generated in cyber attacks on average Americans. But computer criminals are not just using this phishing approach to steal information and money.They are practicing using key logging and spyware to steal passwords and other private information that can allow these people to go unnoticed while disbursal your money. Despite the fact that we see more and more security be put in place to avoid these issues, it continues to happen because so many people in our gild believe it will not happen to them. But what is instead happening, is more of these average people are being targeted because they are basically making it easier for these criminals to steal their personal information. While these criminals certainly could steal more money from millionaires, going after these more average Americans is easier and safer (Wilson).With how technology dependent our society has become, we see more and morehacking crimes today. There even exist free radicals out there that have members from all over the world that collectively hack different websites. For example, Anonymous is probably the most well known hacking co llective in the world. Parmy Olsons book We Are Anonymous Inside the Hacker World, she discusses the history of the group and the attacks that they have done.This group would like us to believe that they are an activist group that seeks freedom for all people, but has hacked financial institutions such as PayPal, MasterCard and Visa. They deprivation us to believe that they are freedom fighters and simply believe in an unregulated Internet, but they tend to go after websites and companies that simply disagree with their message. It is sorting of a double-edged sword, because while they are preaching about freedom of speech, they then in turn go after people who disagree with their message. Olson even discusses the fact that the group went after her because of the books she was writing about this organization.People are definitely becoming more aware of the dangers of computer crime, many Americans still do not see the detrimental effects that cyber crime can have on society. These people that are blinded by traditional views of computer crime, have become the target of attacks. Their lack of preparations have allowed cyber criminals to go after them and gain money through their computer skills.Works CitedBritz, M. T. (2013). Computer Forensics and Cyber disgust and Introduction (3rd ed., Vol. 3). velocity Saddle River, NJ Pearson.Olson, Parmy. We Are Anonymous Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. New York Little, Brown and Company, .United States v. Lori Drew. (Feb. 2008) California . 2 Jul. 2012. news.findlaw.com/wp/docs/cyberlaw/usdrew51508ind.pdf.Webster, S. C. (2013, June 20). Lawmakers Propose Cyber Crime Reforms.Retrieved from Raw Story website http//www.rawstory.com/rs/2013/06/20/lawmakers-propose-cyber-crime-reforms-inspired-by-aaron-swartz/Wilson, T. (n.d.). How Phishing Works. Retrieved June 30, 2013, from How Stuff Works website http//www.howstuffworks.com/phishing.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.