In this study we try to explore the concept of computer crime in a holistic context. The main focus of the research is on computer crime and the diverse forms of computer crimes that are a threat to law and legislation. The research also analyzes many aspects of cyber terrorism and the attacks on business organizations through computer. Finally the research describes various methods used in executing computer crimes and describes several initiatives that have been taken to counter the issues of computer crimes.
Table of Contents
Introduction3
Cyber Terrorism4
Computer Attacks on Organizations6
Methods Used in Computer Crimes6
Hacking6
Worms9
Trojan E-mails9
Strategies to Counter Computer Crimes10
Conclusion11
Works Cited13
Computer Crime
Introduction
This paper aims to enlighten and explore computer crimes. This paper explores different dimensions regarding computer crimes; in addition, the paper enlightens diverse computer crimes and the methods through which the crimes are executed. The research also discusses several steps that are taken by the government to cope with the issues created through computer crime and the terrorist attacks enabled through computers. There are many types of computer crimes; yet, the most known forms are phishing, identity theft and viruses. Phishing is when data associated to the personal information of users are stolen either through e-mails. Law enforcement personnel and computer scientists that specialize in security have noted that computer crimes and the sophistication of the computer criminals are increasing dramatically. It is estimated that computer crimes cause United States victims at least 500,000,000,000 dollars per year.
Many analysts say that as the Internet grows; linking computers around the world more closely than ever before, hacking should be carefully regulated and, in some cases, not tolerated at all. The stakes have grown too high to classify hackers simply as computer experts who mean no harm. Hackers from abroad could tap into U.S. computers and steal military secrets. Computer hacking can disrupt a variety of other government services, such as emergency communications systems.
In addition, business conducted via computer networks has become such an integral part of the U.S. economy that any disruption carries a high price tag. Credit card numbers, banking records and other valuable data about millions of people flow through computers every day, and the security of that information should not be jeopardized. Nevertheless, there is no precise statistics on the amount of computer crime because many crimes are never reported and the losses are difficult to calculate. Yet, with computer crimes increasing at such an alarming rate, by the year 2015 these crimes will result in its victims paying double the amount. This is done by the viruses causing the computer operations and processing to slow down; thus, the harm done to the computer results in the information on the system being destroyed.
Cyber Terrorism
There are some in the world of Information Technology (IT) who believe that cyber terrorism in the true sense of the word does not exist. According to these people, what we observe is simply individuals, groups, or organizations using 'information warfare' (communication and attacks using the internet and other networks) for their own goals, but without creating ...