+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Computer crimes

Essay, term paper, research paper:  Information Technology

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Computer Crimes, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.



Computer Crimes


Computer crimes are on the rise 1 in 10 Americans experience some form of
a malicious attack on their computer system. If you pay attention to the rest
of this speech you will understand how a Hackers mind works and how to defend
yourself from them. In this speech I will tell you why and how people break
into computers, what sorts of trouble they cause, and what kind of punishment
lie ahead for them if caught.

Hackers and Crackers break into computer systems for any of a wide
variety of reasons. Many groups break into computers for capital gain while
still others do it as a means to pass time at work or at school. For most it's
a thrill to figure out how to break into a computer. Most people never have any
intention of causing harm. I believe that for the vast majority of people it's
merely the thrill of the "hunt" at pushes them to such great lengths. Many
employees that work in large corporations feel that they don't get paid as much
as they should. Therefore if they have high security clearance they are able to
capitalize from that by selling the data they have access to on the black-market.
Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets for
the military's new bomber it happens everyday. Too by left is a drawing that
illustrates the method that most Hackers use to take over your computer. Ever
since the dial-up connection was invented anyone with a modem had the ability to
wreck any one of thousands of computers.

One of the most talked about forms of computer crime is computer viruses.
A computer virus is a small but highly destructive program written by an
unscrupulous computer Hacker. Back in 1984 a 17 year old computer Hacker single
handedly brought down four hundred thousand computers in a matter of hours.
Too my left is a graph depicting the # of computer crimes comited from 1988 till
now. Some Hackers create a program called a worm. A worm is a piece of
malicious software and is part of the virus family. People write worms to
transfer money from bank accounts into their own personal checking account.
Another way that Hackers cause trouble is by altering the telephone switching
networks at MCI, AT&T, and Sprint. By doing this they are able to listen to
any conversation they choose. Often-times they will listen in on the Police and
FBI communicating with each-other. This allows them to move to a new location
before they are found. Some Hackers use their knowledge of the telephone system
to turn their enemies home telephone into a virtual pay-phone that asks for
quarters whenever you take the phone off the hook.

A person to commits a computer crime in caught will very likely face a
substantial punishment. Often these types of criminals are never caught unless
they really screw up. The most wanted Hacker Kevin Mitinick was tracked down
and arrested after he broke into a computer that belonged to a Japanese security
professional. After this man noticed that someone had gotten into his computer
he dedicated the rest of his life to tracking down this one man. Kevin was
able to say one step ahead of police for some time but the fatal mistake that he
made was leaving a voice-mail message on a computer bragging about the fact that
he thought he was unstoppable. When he was arrested he faced a 250,000 dollar
fine, 900 hours community service, and a 10 year jail sentence. Many schools
and small businesses still don't have a clue about how to deal with computer
crimes and the like whenever they happen to strike.

In conclusion hopefully you now know a little more about computer crimes
and the people who commit them. Although most computer crimes are never
accounted for the ones that are, are almost always prosecuted to the fullest
extent under the law.


 

Other sample model essays:

Information Technology / Computer Crime
Computer Crime I Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come acros...
Information Technology / Coping With Computers
Coping With Computers CIS 101 DECEMBER 20, 1996 PROF. GARTNER While the twentieth century has proven to be a technological revolution, there has not been a single development with as...
Information Technology / CyberPorn: On A Screen Near You
CyberPorn: On A Screen Near You Cybersex. This word brings to mind a barrage of images, which might be on Stra Trek or virtual reality video by aerosmith. Sex is everywhere today--in books...
Cyberspace and the American Dream: A Magna Carta for the Knowledge Age This statement represents the cumulative wisdom and innovation of many dozens of people. It is based primarily on the ...
Communications Decency Act: Regulation In Cyberspace David Hembree October 23, 1996 Dr. Willis Being one of millions of surfers throughout the Internet, I see that fundamen...
William Gibson's Neuromancer: Cyberspace As described by William Gibson in his science fiction novel Neuromancer, cyberspace was a "Consensual hallucination that felt and looked like a ...
Information Technology / Experiencing Cyberspace
Experiencing Cyberspace 1. If a survey were being done on how people experience cyberspace, one would immediately notice that no two answers would be the same. Experiencing cyberspace i...
Development of Computers and Technology Computers in some form are in almost everything these days. From Toasters to Televisions, just about all electronic things has some form of process...
Information Technology / Does Microsoft Have Too Much Power?
Does Microsoft Have Too Much Power? Initially, there is nothing. Then, there is Bill Gates the founder of Microsoft. Once a young, eager teenager running a small business of other teenager...
Information Technology / Ecodisc
Ecodisc Ecodisc is a program which allows the user to take on the role of a Nature Reserve Manager. It was designed by a man named Peter Bratt, and Englishman in South Devon. Ecodisc is des...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
Browns Mills, New Jersey, United States
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per the rubric.
Browns Mills, New Jersey, United States
it is always perfect
Frederick, Maryland, United States
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663 is absolutely excellent. This writer provides the highest quality of work possible.
Browns Mills, New Jersey, United States
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD