Preview

Is Your Information Safe?

Powerful Essays
Open Document
Open Document
1575 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is Your Information Safe?
Is Your Information Safe?

He doesn't wear a stocking mask over his face, and he doesn't break a window to get into your house. He doesn't hold a gun to your head, nor does he ransack your personal possessions. Just the same he's a thief. Although this thief is one you'll not only never see, but you may not even realize right away that he's robbed you. The thief is a computer hacker and he "enters" your home via your computer, accessing personal information -- such as credit card numbers
-- which he could then use without your knowledge -- at least until you get that next credit card statement. Richard Bernes, supervisor of the FBI's Hi-Tech squad in San Jose, California, calls the Internet "the unlocked window in cyberspace through which thieves crawl" (Erickson 1). There seems to be an unlimited potential for theft of credit card numbers, bank statements and other financial and personal information transmitted over the Internet. It's hard to imagine that anyone in today's technologically oriented world could function without computers. Personal computers are linked to business computers and financial networks, and all are linked together via the
Internet or other networks. More than a hundred million electronic messages travel through cyberspace every day, and every piece of information stored in a computer is vulnerable to attack (Icove-Seger-VonStorch 1). Yesterday's bank robbers have become today's computer hackers. They can walk away from a computer crime with millions of virtual dollars (in the form of information they can use or sell for an enormous profit). Walking away is precisely what they do. The
National Computer Crimes Squad estimates that 85-97 % of the time, theft of information from computers is not even detected (Icove-Seger-VonStorch 1). Home computer users are vulnerable, not only for credit card information and login IDs, but also their files, disks, and other computer equipment and data, which are subject to attack. Even if this



Cited: Cambridge Publishing Inc. "PC Security: Internet Security Tool to Deter Hackers." Cambridge Work-Group, (1995): Jan, pp 1. Denning, Dorothy E. "Privacy takes another hit from new computer rules" USA Today, (1996): Dec 12, pp 08A. Erickson, Jim. "Crime on the Internet A Growing Concern." Seattle Post Intelligencer, (1995): Nov 15, (1994): May 1, pp 34. Quittner, Joshua. "Technology Cracks in the Net." Time, (1995): Feb 27, pp 44.

You May Also Find These Documents Helpful

  • Best Essays

    Nt1110 Unit 11 Lab

    • 2482 Words
    • 10 Pages

    In 1969, the first message, “login”, was sent over ARPANET, the predecessor of today’s internet (Kleinrock, 2008). ARPANET was designed as a communication system that would allow researchers to access information from other researcher’s computers around the country, therefore allowing information to flow more freely (Kleinrock, 2008). Computers and the internet have become intertwined into our daily lives.…

    • 2482 Words
    • 10 Pages
    Best Essays
  • Good Essays

    -Jasper does steal, but only what he needs to survive and he only steals from people who can afford to lose it.…

    • 1288 Words
    • 6 Pages
    Good Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Cis 105 Security Systems

    • 465 Words
    • 2 Pages

    With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or business computer, it is very important to get some type of security protection. There are a lot of options out there in terms of what brand and what level of security an individual is looking for. The best option to protect a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to worry about is identity theft. Identity theft problems can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or annoyances to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data contained protected within the computer is important.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    With more and more regularity, we learn about the loss of personal and financial information because of cybercrimes originating from around the world. Elections, power grids, movie productions companies, government agencies, and financial institutions are vulnerable to cybercriminals. Each time a breach occurs we hope that it will not reach our personal or business lives. However, the likelihood of staying cyber safe seems less and less likely to happen. One only has to look at the Equifax fiasco, which alone resulted in the loss of personal financial data for 143 million Americans.…

    • 92 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The computer world gives criminals a large amount of power because victims can just about anyone and can happen internationally (Maras, 2015). It can be hard for law enforcement to understand cybercrime because of how fast new crimes are committed and the new ways to commit those crimes is constantly changing (Maras, 2015). For example, various ways to commit cybercrime include hacking, malware, cyberterrorism, cyberextortion, and cybervandalism (Maras, 2015). It can be hard for law enforcement to keep up with these criminals because of how often technology is changing. Account holders of platforms such as social media, online bank accounts and billing accounts, email, and more have to be very cautious when using technology because of how easy…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    was falsely viewed by the public, in other words the public was not getting the full story. Now a…

    • 878 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Better Essays

    “During a three-day period in February 2000, some of the most high-profile sites on the World Wide Web were temporarily knocked out of service.”(Issues and Controversy) This quote is one of the many that show the down side to hacking. A hacker is a person who takes pleasure in understanding the internal workings of a systems. This does not necessarily classify hackers as bad. There are good hacking and bad hacking. But on the subject of hacking, its unclear whether or not they are truly good or bad. Not every single hack is bad.…

    • 1908 Words
    • 8 Pages
    Better Essays
  • Good Essays

    The Web's Dark Side

    • 835 Words
    • 4 Pages

    This article by Mannix, Locy, Clark, Smith, Perry, McCoy…Kaplan (2000) titled The Web’s Dark Side discusses the not-so-popular side of surfing the internet, referred to as cyberspace–a rather outdated nickname–and plays out a week online with examples various crimes and misdemeanors, swindles, thefts, perils and problems of the internet. The types of crimes and wrongdoings is vast, and many various types of crimes are detailed with accounts of individuals, what crimes were committed, how it came about, and sometimes the outcome. The material demonstrates how fast the world of the Internet has developed: written thirteen years ago, it already hints of a day long ago, and therefore is enjoyable reading for the comparison of matters today. At the time it was breakthrough technology. If re-written, it could apply to today as well.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Technology and Crime

    • 2517 Words
    • 11 Pages

    Examples of these crimes include, electronic funds transfer crime, electronic money laundering, [2]counterfeiting, and software piracy.[3] Contrary to traditional property offences, computers coupled with telecommunications technology enables offenders not to leave any traces of usual biological evidence in interpersonal offences such as finger prints or hair that could lead to the offender through forensic tests. Even if the police traced back the computer that the fund transfer crime was originated, the actual offender would be uncertain if it’s located in internet café which is used by numerous customers. This anonymity is considered the major attraction for offenders with advanced computer skills to commit such crimes. This paper will discuss the effectiveness of the current law in protecting the people from the new treats and possible policies or methods that could be implemented by authorities to combat this…

    • 2517 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Computer Hacking

    • 4083 Words
    • 17 Pages

    15. Pipkin, Donald L. (1997), Halting the hacker: A practical guide to computer security, United States of America, Prentice Hall.…

    • 4083 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crimes

    • 2557 Words
    • 11 Pages

    According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much so that online security expenditures were expected to double to $30 billion in 2004.…

    • 2557 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 8636 Words
    • 35 Pages

    Trends are developing to shift the nature of crimes from traditional to Hi-Tech and it is impossible to prevent people from misusing technology to commit crimes. Computer or networks may be used as a tool or a storage medium to commit crimes. In the meantime, we must keep in mind that all computers related systems are vulnerable to destruction and intrusion. As a result some authors classify computer crimes under three areas such as :…

    • 8636 Words
    • 35 Pages
    Good Essays

Related Topics