Growing Threat of Computer Crimes

Topics: Computer security, Computer, Security Pages: 8 (3261 words) Published: May 4, 2008
Running head: THE GROWING THREAT OF COMPUTER CRIME The Growing Threat of Computer Crime Diana Ritter Baker College of Cadillac May 9, 2001 Abstract Computers have been used for most kinds of crime, including fraud, theft, larceny, embezzlement, burglary, sabotage, espionage, murder, and forgery, since the first cases were reported in 1958. One study of 1,500 computer crimes established that most of them were committed by trusted computer users within businesses; persons with the requisite skills, knowledge, access, and resources. With the arrival of personal computers to manipulate information and access computers by telephone, increasing numbers of crimes--electronic trespassing, copyrighted-information piracy, vandalism--have been committed by computer hobbyists, known as hackers, who display a high level of technical expertise. For many years, the term hacker defined someone who was a wizard with computers and programming. It was a challenge to all hackers, and an honor to be considered a hacker. But when a few hackers began to use their skills to break into private computer systems and steal money, or interfere with the system's operations, the word acquired its current negative meaning. With the growing use of computers and the increase in computer crimes, early detection, deterring computer crimes, and new laws regulating and punishing these computer crimes are necessary. Without it, chaos will be the end result. The Growing Threat of Computer Crime Do you think your company’s computer systems are secure? Think again. Billions of dollars in losses have already been discovered due to computer crimes. Billions more have gone undetected. Trillions more will be stolen, most without detection, by the emerging master criminal of the twenty first century --The computer crime offender. What’s worse yet is that anyone with a computer can become a computer criminal. Crimes such as embezzlement, fraud and money laundering are not new. However, each of these crimes now has a new partner in crime-the computer. Crimes that have become unique due to the availability and widespread use of computers include: a. unauthorized use, access, modification, copying, and destruction of software or data; b. theft of money by altering computer records of theft of computer time; c. theft or destruction of hardware; d. use or conspiracy to use computer resources to commit a felony; e. intent to obtain information or tangible property, illegally through use of the computer. (Fraud Survey Results, 1993) Although incidents in this second category of crimes do present a serious problem, embezzlement is by far the major threat to small businesses. This is evident by the frequency of reports in the local media. Cash is the most vulnerable asset as it is the easiest for the perpetrator to convert to personal use. Firms most vulnerable to theft of money are firms that must rely on one individual to perform the duties of office manager and bookkeeper. Having more than one employee in the office provides an opportunity to effect certain internal controls, particularly separation of duties. Small business owners should review their insurance coverage for employee dishonesty. While there are no standards to determine precisely the amount of coverage necessary, the marginal cost of adding an extra $1,000 of coverage decreases as the coverage increases. A business owner should consult with an insurance agent and err on the side of caution, just to be safe. Although theft of money is a major subject when speaking of computer crime, there are also many other areas to be concerned about. Some of the computer crimes for the 21st century will include: Communication crimes (cellular theft and telephone fraud). Low-tech thieves in airports and bus terminals use binoculars to steal calling card access numbers. Thieves will park their vans along busy interstate highways and use specialized equipment to steal cellular telephone access codes from the air. This is just...

References: Abreu, E.M. (1999, September). Experts find Microsoft Hotmail hack easier than claimed. Company Business and Marketing. Bernardo, R. (May 4, 2001). State law moves to address technology crime. Honolulu Star-Bulletin Cisco Secure IDS (2001). [On-line]. Available: Eaton, J.W. (1986). Card-carrying Americans. Privacy;, Security, and the national i.d card debate. United States of America: Rowman & Littlefield. Farrow, R. & Power, R. (2001). Five vendors some no-nonsense questions on IDS. CSI Intrusion System Resource Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing. Network ICE Corporation (1998-2000). Password theft [On-line]. Available: Niccolai, J. (02/11/2000). Analyst puts recent hacker damage at $1.2 billion and rising [On-line]. Available: http://www.nwfusion.comn/news Real Secure (2001). [On-line]. Available: Schindler, D.J. (2000, March). E-Crime and what to do about it. Los Angeles Business Journal. SilentRunnerTM. SilentRunnerTM [On-line]. Available: Teach, E. (1998, February). Look who 's hacking now. CFO, The Magazine for Senior Financial Executives.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Threats Essay
  • Computer Crime Essay
  • Computer Crime Essay
  • computer crimes Essay
  • Computer Crime Essay
  • Computers and Crime Essay
  • Computer Crime Essay
  • Computer Crimes Essay

Become a StudyMode Member

Sign Up - It's Free