Tuesday, April 16, 2019
Crytography & Computer attack Essay Example for Free
Crytography calculating machine attack EssayComputer attack involves operations that deny, disrupt, destroy or drop off breeding stored in computers and computer networks. In other words, computer attack is known as electronic attack used a pass waterst a computer. The attackers of stored information in computer are called hackers or intruders. A residue occurs between computer attackers in the level of skill and sophistication of the attack (Roman Peter, 2007). More recently, attackers have essential skills that make it possible for them to portal other peoples information by using automatise tools. The automated and sophisticated tools are cheaply available in the market making it possible to access other peoples computer. The major incidents of computer attacks include bringing down of eBay, Yahoo and Amazon. com by hackers. The motives for computer attack are to destroy data or information and access man-to-man information for policy-making, social and financial gai n. On individual basis a hacker can attack own(prenominal) computer to destroy information on revenge mission, or out of grudge.Attackers of computers especially in political perspective aim at gaining information for their opponent candidates to outperform him or her during campaigns (Rhodes Mary, 2003). In the context of business, hackers go for core variables necessary to compete in global markets such(prenominal) as information related to merchandise strategies. Hackers of computer information do so once they have a particular opportunity such as use of high speed digital subscriber line. It is an opportunity that has been used by hackers to gain access to private information.The net income is known as an important tool in education or business but some offenders find ways of using internet provided in cyber to commit wickednesss. The offenders come across their needs while putting their victims at risk. There are a number of cyber offenses popular among internet offenders such as credit card fraud, cyber stalking, identity theft, software piracy, cyber terrorism and phonograph. These crimes are very popular in the modern society as internet is cheaply available in cybercafes and mobile phones. The children and unfledged generation are exposed to cyber risks such as addiction to phonographic sites.Software piracy is another super acid cyber crime in the modern world of advanced technology. Cyber crimes are as dangerous as both other form of crime and require law enforcement officers to be careful when handling cyber criminals. As a complex issue some offenders are prosecuted while others are set free. Three main reasons that mince to prosecution of some criminals and release of others include first, there are no defined penal laws relating to cyber crimes (Wible Brent, 2003). This meaning that some individuals search information from the internet and end up exceeding certain legal nutriment without their knowledge.Such individuals are cyber cri minals but are never arrested especially employees working in a networked office. Second, considering whether an individual has or has not committed a previous offense without computer or an offense akin in nature. Individuals who are convicted of other offences outside the cyber such as bank robbery are prosecuted of cyber crime once they are considered as suspects. Third, children below the maturate of eighteen years which is considered as the average age for a person to be prosecuted are set free while they are cyber offenders.The law to the highest degree cyber crime favors some offenders while others are charged with criminal activities. Children are the major victims in cyber crime and yet are protected by the law owing to age factor. References Roman Peter, 2007, Computer Crimes, American Criminal Law Review, Vol. 44. Wible Brent, 2003, A Site Where Hackers Are Welcome Using Hack-in Contests to Shape preferences and Deter Computer Crime, Yale Law Journal, Vol. 112. Rhodes Mary, 2003, Computer Crimes, American Criminal Law Review, Vol. 40.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment