StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Analyzing a Computer Crime - Essay Example

Summary
The paper 'Analyzing a Computer Crime' states that today safeguarding of any computer system or network becomes very difficult. Less technical ability is required for the beginner attacker, because of proven past methods are easily accessed through the Internet by the attacker…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Analyzing a Computer Crime
Read Text Preview

Extract of sample "Analyzing a Computer Crime"

Today safeguarding of any computer system or network becomes very difficult. Less technical ability is required for the beginner attacker, because ofproven past methods are easily accessed through the Internet by the attacker. Computer crime (or Cyber Crime) is no more an act of a curious teenager fiddling with a combination of numbers to form a password to gain an unauthorized access to data. Any user who has access on computer or network system can infect the system with the help of worms and viruses and thus affecting the whole network, which is one of the most common computer crimes that accounts for major losses to organizations. In addition, methods and tools (software programs) are easily available for hackers. Nowadays computers are used for various crimes as well as criminal investigations like identifying theft, hackers, dissatisfied employees or computer espionage (spying) who obtains sensitive information for competing companies There are various terms for computer crime such as, cyber crime, e-crime, hi-tech crime and electronic crime [C5]. However, in all cases criminal activity is performed with the help of a computer or network, or on the computer or network. Moreover, computer or network behaves as tool, target or place for (any) criminal activity. In general, computer crime is defined as criminal activity involving the information technology infrastructure [C5]. This includes: Illegal or unauthorized access of data. Illegal interception by technical means of non-public transmissions of computer data to, from or within a computer system. Data interference, which is unauthorized damaging, deletion, deterioration, alteration or suppression of computer data. Systems interference which is interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data. Making illegal programs such as worm, viruses and Trojan horse for seriously affecting the computer or network systems. Misuse of devices, forgery (ID theft). Electronic fraud such as credit, debit card fraud seen today. [C5] Some forms of computer crimes that exist today are internet fraud, offensive content on websites, harassment by making directs obscenities and derogatory comments at specific individuals focusing on gender, race, religion, nationality, and sexual orientation. In addition, for drug trafficking, drug traffickers are increasingly taking advantage of the Internet to sell their illegal substances through encrypted e-mail and Websites. Terrorism too is making possible with the help of computer (on Internet) that is termed as cyber terrorism [C5] According to the “Data Protection 2003” website, “The computer is one of the most revolutionary discoveries in the development of the technical-technological civilization. Informatics, although a young science is developing much faster than other science. In only 50 years’ time, many devices for storage and processing of massive data have been discovered and enhanced. By comparison, other scientific branches took decades to reach the same level of knowledge and experience” [C2]. Nowadays, computer crimes are proliferating because of the vast use of computers. However, computers are unavoidable because practically all organizations use computers somehow; at least for recording, updating files or processing documents. The computer is a prevailing device, used to commit crimes is seen in the case of a University of Texas student convicted for computer hacking into his school’s system. According to the “law professors” website, the attacker tried breaching the security of hundreds of computer systems including the victim’s web computer systems in January, February and April of 2002. On noticing the incident, the university officials confronted and warned him of future trials to hack the victim’s computer security system. [C1] The attacker (student) went ahead to create a computer program to hack into the victim’s protected system, for which, he did not have authorized access in it, in January 2003. With the software (computer program), the attacker was able to steal over 37,000 names and social security numbers (SSN) of individuals in the victim’s computer system via the TXCLASS system [C3]. The impact of this act was an enormous breakdown of the TXCLASS computer system’s web based server. The attacker had also stolen earlier about 8,000 names and social security numbers from the victim’s system. [C1] According to the “usdoj” website, the impact of the attack resulted in the victim losing approximately $122,000 and another $60,000 in losses, which was incurred, by the victim to warn individuals, whose names and social security numbers were stolen as potential identity theft. [C3 & C1] The Macomb’s website also reported that the victim communicated with nearly 200,000 individuals regarding the theft. [C4] Besides the national coverage of the theft, the website reported that the victim went ahead to communicate to those affected by the crime, which includes 45,000 mails, 80,000 letters to those whose social security numbers are compromised and an additional 60,000 letters sent out to those with non-sensitive information compromised. The “usdoj” website reports that an evidence during his trial revealed that in October and November 2002, the attacker downloaded biographical data from an internet website having details of genealogical information of individuals born during the years 1940 to 1984. Some of the downloaded genealogical information includes individual’s names, date of birth, gender, father’s name, mother’s maiden name and place of birth. [C3] The jury found the victim guilty of accessing protected computers without authorization, which is known as computer hacking and possession of stolen social security numbers. The attacker acquitted on two counts of possession of more than 15 access devices with the intent to defraud. [C3] Because of the attacker’s conviction, he faces up to 6 years in federal prison. The United States secret service and the University of Texas ITS information security office investigated this case. [C3] According to the “lawprofessors” website, the FBI compiled a 2005 computer crime survey of over 2000 public and private organizations in four states. The survey shows that nearly nine out of ten organizations experienced computer security incidents in a year. 20% of them indicated they had experienced 20 or more attacks. Viruses (83.7%) and spy-ware (79.5%) topped the list. [C1] The financial impact showed that over 64% of the respondents incurred a loss. Viruses and worms cost the most, accounting for $12 million of the $32 million total losses. The attacks came from 36 different countries, the US leading with 26.1% followed by China with 23.9%. The law enforcement only saw 9% reporting incidents but of the 9% that reported 91% were satisfied with law enforcement responses and 81% said that they would report incidents to FBI or other law enforcement agencies. [C1] References: C1. White Collar crime Prof Blog http://lawprofessors.typepad.com/whitecollarcrime_blog/computer_crime/index.html C2. Computer Crime- Notion and Definition http://www.dataprotection2003.info/speakers/Marijan_Risteski/presentation.pdf C3. United State Department of Justice http://www.usdoj.gov/usao/txw/press_releases/2005/ut_hacker.con.pdf C4. McCombs school of Business http://www.mccombs.utexas.edu/datatheft/ C5. Computer Crime http://en.wikipedia.org/wiki/Computer_crime Read More

CHECK THESE SAMPLES OF Analyzing a Computer Crime

Computer Forensics

This article takes a critical analysis of computer forensics as a way of presenting evidence in courts on matters pertaining to computer crimes.... It analyses the problems encountered in the business world as a result of computer crimes.... Various computer-related criminal acts are highlighted in the paper.... The paper focuses on the importance of computer forensics in collecting, interpreting and presenting evidence relating to cyberspace crimes....
11 Pages (2750 words) Research Paper

MATHEMATICAL STATISTIC AND ITS IMPACT ON LAWENFORCEMENT

Surveying crime Statistics plays an important role in surveying crime, data collected from crimes scenes can be evaluated using statistical tools and from the obtained results, conclusions and projections can be made.... This helps in the accurate determination of crimes crime treads and helps in formulating accurate results on ways of solving these crimes.... Statistics is also used in forensic study for evaluation of the corrected evidence (Penick et al, 1976)Suppressing crime and terrorist threats For security agencies to combat crime and terrorism threat, they need to collect a lot of information, process, analyze and interpret this information....
2 Pages (500 words) Term Paper

The World of Information Technology and Communication

Over hundreds of people report abusive phone calls, obscene emails and such has made cyber stalking a computer crime and punishable by law (Walden, 2007).... In the UK and US, a number of legislations define the prosecution conditions for a computer crime which are not only legal counter measures against such crimes but also a behavioural measure.... In 1993, mere ten cases were reported worldwide of computer crime which grew to hundreds during the 21st century (Walden, 2007)....
14 Pages (3500 words) Essay

Types and Measures of Cybercrimes

A crime defines as an act of omission or commission that infringes another party's rights and is punishable under legal systems.... Infecting other parties' system through spreading viruses is another type of 'cyber-classified' crime.... computer programs that breach the target system facilitate it.... acking an organization's computer system by a competing company to retrieve a formula for the victim's new product, for producing a similar commodity, is an example of a cybercrime....
2 Pages (500 words) Coursework

Cyber Crime as an Unlawful Act

Topic: Cyber Crime Introduction Cyber Crime can be described as an unlawful act in which a computer is either the target or a tool, or both.... uring the project, we should deal with the three aspects of cybercrime which are; Offences done against computer systems and data, offences done using computers, and electronic proof on a computer connected to any offence.... This paper ''Cyber crime as an Unlawful Act '' discusses that Cyber Crimes include; email spoofing, sending intimidating emails, Cyber defamation etc....
8 Pages (2000 words) Term Paper

How Geographical Profiling Can Help in the Investigation of Crimes and the Identification of Criminals

The essay "How Geographical Profiling Can Help in the Investigation of Crimes and the Identification of Criminals" elaborates on how the geographical profiling is defined as a crime investigation tool used by experienced crime investigators to analyze sites of serial crimes and identify possible residential areas of the offenders.... It is worth acknowledging the technological advancement that has worked to improve the crime investigation in the line of geographical profiling....
7 Pages (1750 words) Essay

Digital Crime and Digital Terrorism

his paper looks at issues relating to digital or computer crime and digital terrorism; however, it gives an over view in these aspects meaning that it will not go into deep technical aspects of the issues.... Digital evidence and computer crime: Forensic science, computers and ... This report "Digital crime and Digital Terrorism" demonstrates digital criminals and digital terrorists that have beneficiated greatly by the use of information technology due to safer means of communication....
6 Pages (1500 words) Report

Digital Forensics

This is because a chain of well documented evidence has to be maintained in order to reconstruct a clear history of the happenings of the crime and find the person responsible (Margaret, 2014) ... hild pornography is an internet crime against children because they are used as sexual objects (Wortley & Smallbone, 2006).... The investigating officer prepared an affidavit that described the basis for the crime of child pornography and a search warrant limiting the search to the suspect's workspace was issued by a competent court. ...
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us