Monday, August 19, 2019
Computer Crimes :: essays research papers
 Computer Crimes      Computer crimes are on the rise 1 in 10 Americans experience some form of  a malicious attack on their computer system. If you pay attention to the rest  of this speech you will understand how a Hackers mind works and how to defend  yourself from them. In this speech I will tell you why and how people break  into computers, what sorts of trouble they cause, and what kind of punishment  lie ahead for them if caught.         Hackers and Crackers break into computer systems for any of a wide  variety of reasons. Many groups break into computers for capital gain while  still others do it as a means to pass time at work or at school. For most it's  a thrill to figure out how to break into a computer. Most people never have any  intention of causing harm. I believe that for the vast majority of people it's  merely the thrill of the "hunt" at pushes them to such great lengths. Many  employees that work in large corporations feel that they don't get paid as much  as they should. Therefore if they have high security clearance they are able to  capitalize from that by selling the data they have access to on the black-market.  Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets for  the military's new bomber it happens everyday. Too by left is a drawing that  illustrates the method that most Hackers use to take over your computer. Ever  since the dial-up connection was invented anyone with a modem had the ability to  wreck any one of thousands of computers.    One of the most talked about forms of computer crime is computer viruses.  A computer virus is a small but highly destructive program written by an  unscrupulous computer Hacker. Back in 1984 a 17 year old computer Hacker single  handedly brought down four hundred thousand computers in a matter of hours.  Too my left is a graph depicting the # of computer crimes comited from 1988 till  now. Some Hackers create a program called a worm. A worm is a piece of  malicious software and is part of the virus family. People write worms to  transfer money from bank accounts into their own personal checking account.  Another way that Hackers cause trouble is by altering the telephone switching  networks at MCI, AT&T, and Sprint. By doing this they are able to listen to  any conversation they choose. Often-times they will listen in on the Police and  FBI communicating with each-other. This allows them to move to a new location    					    
Subscribe to:
Post Comments (Atom)
 
 
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.