Preview

Computer Crimes

Good Essays
Open Document
Open Document
679 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Crimes
Computer Crimes

Computer crimes are on the rise 1 in 10 Americans experience some form of a malicious attack on their computer system. If you pay attention to the rest of this speech you will understand how a Hackers mind works and how to defend yourself from them. In this speech I will tell you why and how people break into computers, what sorts of trouble they cause, and what kind of punishment lie ahead for them if caught.

Hackers and Crackers break into computer systems for any of a wide variety of reasons. Many groups break into computers for capital gain while still others do it as a means to pass time at work or at school. For most it's a thrill to figure out how to break into a computer. Most people never have any intention of causing harm. I believe that for the vast majority of people it's merely the thrill of the "hunt" at pushes them to such great lengths. Many employees that work in large corporations feel that they don't get paid as much as they should. Therefore if they have high security clearance they are able to capitalize from that by selling the data they have access to on the black-market.
Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets for the military's new bomber it happens everyday. Too by left is a drawing that illustrates the method that most Hackers use to take over your computer. Ever since the dial-up connection was invented anyone with a modem had the ability to wreck any one of thousands of computers.

One of the most talked about forms of computer crime is computer viruses.
A computer virus is a small but highly destructive program written by an unscrupulous computer Hacker. Back in 1984 a 17 year old computer Hacker single handedly brought down four hundred thousand computers in a matter of hours.
Too my left is a graph depicting the # of computer crimes committed from 1988 till now. Some Hackers create a program called a worm. A worm is a piece of malicious software and is part

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    Computer Hacking in 1960’s up to 1970’s – an individual working with computers who were technically gifted and skilled it was defined by computer ethicist Duncan Langford (1995).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    An act of theft performed by a hacker falls into the category of “theft,” but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of “forces of nature.”…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Peter Krapp Analysis

    • 703 Words
    • 3 Pages

    Peter Krapp builds a well-constructed argument designed to persuade readers that computer hacking is a danger that steals our most valuable possession—personal information—from our most vulnerable people--students. The article focuses on personal information about college students stolen from college computer networks. The writer builds his argument brick by brick. He starts by giving an example of student data stolen from a college by hackers in China, relating his topic to an event that really happened. The writer quickly establishes himself as an expert in the topic so readers can trust his information. Krapp asks and answers questions about the theft of data, goes into more depth about the type of information stolen from college networks, and then briefly touches on the laws, or the lack of laws, to protect students. He points out that data is stolen from students by not only foreign hackers, but also by American companies. The writer finishes with a call for colleges to protect student data, clearly stating his purpose.…

    • 703 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. C.C. Palmer, who manages the Network Security and Cryptography department at the IBM. Thomas J. Watson Research Center writes, “They are afraid that some hacker will break into their Web server and replace their logo with pornography, read their e-mail, steal their credit card number from an on-line shopping site, or implant software that will secretly transmit their organization’s secrets to the open Internet”. This hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Cybercrime: Hacking

    • 1198 Words
    • 4 Pages

    With everything in society advancing rapidly, it should be of no surprise that technology is now used to commit crimes against other people. Those crimes include identity theft, stealing money, illegal gambling, and cyberstalking. This paper will review cybercrime and the differences there are from traditional crime and it will review the purpose of hackers. There will also be three cases reviewed to help bring light to what kind of cybercrimes are being committed around the world.…

    • 1198 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    How has computer hacking inferred modern society? In this passage I will be talking briefly about the fundamentals of computer hacking from the past to the present. Computer hacking has changed more over time resulting in computer emergences to corporate system shutdowns. This research paper will be talking about three major parts of computer hacking. The first concept of hacking is the origin of creation. The next part will be how hacking has affect on the present-day society. Finally, the last piece of information will be going over the future of system hacking.…

    • 1291 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Digital Evidence

    • 353 Words
    • 2 Pages

    Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Crime In America

    • 929 Words
    • 4 Pages

    of the Internet. All of these factors plus the fact of more and more business…

    • 929 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Hacker

    • 1123 Words
    • 5 Pages

    The advancement of information technology spans a lot of areas of our lives. Information technology has made a huge difference in industry, agriculture and services. This in turn boosts up the productivity of the society. However, the development of computer technology also leads to many security problems in our modern society. There has emerged a group of computer savvy people who seeks and exploits weaknesses in a computer system or computer network. Their motivation has put many questions on debating table. On the one hand, many people contend that a hacker is a dangerous person who will probably destroy the whole world’s computer system. On the other hand, others argue that hackers are not dangerous and not causing harm. This essay will discuss the two sides of the coin with regard to hackers with relevant examples.…

    • 1123 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Cybercrime, also called computer crime because the use of a computer is used as tool to help people meet their illegal ends. Some cybercrime examples are committing fraud, trafficking in child pornography and intellectual property, stealing other peoples identity, or violating privacy of others.…

    • 395 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Hacking has been around for more than a century. At first, the term “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. But because of the exploitation of these knowledge and the obsession to forbidden information, it soon became a threat to computer technology. The root of computer hacking was dated back in the early 1960’s by a group of university students, especially in M.I.T. and Stanford.…

    • 3072 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    We all have at least one person in our life that is crazy about computers… the sound of the keyboard typing away throughout all hours of the night. With the advanced technology society has brought us, it is a normal occurrence in your typical household. Since the computer has become so accessible to mostly everyone, life has become much easier for humans. What would we do without the Internet? You can find information on any topic you choose, from the click of a button or two, right at your fingertips. You can communicate with others from across the globe, or even look up movie times at your local movie theatre. Maybe you just want to get lost in a good videogame. With the computer taking over our daily lives, everyone takes advantage of it in different ways. With all the different uses the computer provides, this creates various types of computer users.…

    • 1152 Words
    • 5 Pages
    Powerful Essays