Monday, November 25, 2019

cyber laws essays

cyber laws essays The concept idea of cyber terrorism has always been a great treat for computer technology since the first computer was invented in the late fifties; and grown up with the technology that has developed extremely. The use of the computers within the business and government sector have rapidly increased; this therefore provides a whole new prospect for a distinctive criminal to prosper in most cases. The advances in the computer technology has brought a new methodology in crime. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen different kinds of unauthorized access into classified government computer files, phone card and credit card, and electronic emails. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and the information should be freed. They think that the crimes they commit are really not crimes at all. Noone can deny that the internet is the most useful tool for computer abusing. There are many forms of computer abuse and yet they have not come to any solution. Computer crime appears in a number of forms; malicious damage, unlawful trespass and use (theft of computer time), theft of information, unauthorised information, imposturing by computer and pirating computer software, hacking and creating viruses to destroy information systems and hard drives, child pornography, cyber porn, theft of software and copyrights. The computer systems are under attack from a multitude of sources. These varies from viruses and worms, to human threats, such as hackers. These attacks target different characteristics of a system. Viruses and worms attack a system in one of two ways, either internally or externally that both share the primary objective of replication. However, they are different according to techniques they use and their system r...

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.