Wednesday, March 27, 2019
Hackers Today :: Essays Papers
Hackers TodayOver the last twenty years, a technological revolution has occurred as estimators are without delay an essential fixings of todays society. Large com dumbfounding devices are used to track reservations for the airline industry, process billions of dollars for banks, make up products for industry, and conduct major transactions for businesses because more and more people now have computing devices at home and at the office. People commit computer crimes because of societys declining ethical standards more than any economic need. According to experts, gender is the notwithstanding bias. The indite of todays non-professional thieves crosses all races, age groups and economic strata. Computer woefuls move to be relatively honest and in a position of trust a couple of(prenominal) would do anything to harm an another(prenominal) human, and most do not manage their crime to be truly dishonest. Most are males women have tended to be accomplices, though of late they a re becoming more aggressive. Computer Criminals tend to usually be between the ages of 14-30, they are usually bright, eager, highly motivated, adventuresome, and willing to accept technical challenges.(Shannon, 162) It is tempting to liken computer criminals to other criminals, ascribing characteristics somehow different from normal individuals, but that is not the case.(Sharp, 183) It is believed that the computer criminal often marches to the same drum as the potential victim but follows and unanticipated path.(Blumenthal, 12) There is no actual profile of a computer criminal because they range from young teens to elders, from black to white, from inadequate to tall. Definitions of computer crime has changed over the years as the users and misusers of computers have grow into new areas. When computers were first introduced into businesses, computer crime was defined simply as a form of white-collar crime committed inside a computer system.(2600Summer 92,p.13) Some new terms h ave been added to the computer criminal vocabulary. Trojan Horse is a hidden code put into a computer program. Logic bombs are implanted so that the culprit doesnt have to physically present himself or herself. (Phrack 12,p.43) Another form of a hidden code is salamis. It came from the big salami loaves sold in delis years ago. lots people would take small portions of bites that were taken out of them and then they were on the QT returned to the shelves in the hopes that no one would notice them missing.(Phrack 12,p.44) Congress has been reacting to the outbreak of computer crimes.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment