StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer - Essay Example

Cite this document
Summary
The essay "Computer Crime and the Measures That Can Curb the Crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.3% of users find it useful
Computer Crime and the Measures That Can Curb the Crimes Caused On Computer
Read Text Preview

Extract of sample "Computer Crime and the Measures That Can Curb the Crimes Caused On Computer"

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer Internet crimes are the illegal or wrong activities that are committed on the internet. These activities are always committed through the internet or by the use of internet. The crimes that are committed in the internet have spread to global levels such as legislation. Internet crimes have been on the rise due to the fast changing information technology. This has also proved to be a major threat for the security in combating the crimes that are committed on the internet. The security experts have stepped up their game, by using preventive technology that can be used to detect internet crimes. The methods that is used to in the detection of the crimes that are committed on the internet crime including intrusion and packet sniffers A computer is an electric device that is programmed to specifically respond to the instruction that is commanded through information in a systematic manner that is digitized in form of data. This information is then responsible for the manipulation of the program based on the data that is being processed. Computers also have the capability of storing data for a good duration. Programs can be built in an invariable way in a computer, hence it may be found in the microprocessor. The relationship between computer and telecommunication is the manner in which both present a very comprehensive aspect that gives the overview in the interaction and the relationship between data processing and telecommunication. The vital aspect of these two disciplines is the manner that they relate in the coding, error detection and correction and the sounds that they produce (Cavanah, Cassandra). The design and programs that are used in both computers and telecommunication cannot be used to understand the exchange of hardware and software in computer and telecommunication. The term computer crime is very wide and it may also have different definition that conveys the term computer crime as an illegal offence that is committed by a computer through a specific individual. The other thing that the definition of computer crimes may not be able to highlight is the application that is used in committing an offense or the type of computer hat as used. Different individuals, organization and nations define computer crimes differently, hence making it definition to be flexible. Given this factors then will have to define the computer crimes through the meanings of hacking, software piracy and phreaking. Hacking is the use of one computer to lacerate the performance of the other computer, through the use of programs such as scanner that is randomly dials numbers that generate tone that can be recorded (Cavanah, Cassandra). Hackers have a tendency of looking for this numbers and using them again. If the Hacker succeeds in calling up the number and finds out that the logon prompt is active. This is when hacking begins as the hacker tries to pass the information that he has access to. The most common computer crime is software piracy. Copying of software is illegal just as Hacking and phreaking. This offence of software piracy is covered in the computer crimes. Its definition is still unclear due to the nature of the computer crime that might be committed and the characteristic that is you used in sharing the software. This concept will determine nature of crime and the vagueness. Phreakering is the mischievous action of illegally using an order with the intention of avoiding to pay telecommunication bills, order transfer and other related services that has the same mode of payment.( Cavanah, Cassandra.) Phreareking involves the use of illegal boxes and machines, in ordering for items that have prove to be problematic to the security avoiding from taking place. The person who carries out a phreak operates in the same way as a Hacker. A phreak conducts an experiment which he or she explores keenly in choosing the entire phone system that with the aim of finding the different ways of making things happen the way he wants, most frequently the phreak aim is making free calls. Internet crimes comes in many forms, this crimes may include cyber crimes, internet scams, stalking in cyber and identity theft are just but some few example of primary crimes that are caused in the internet. Find the perpetrators who always commit these crimes has proved to be very futile, this is because the perpetrators of internet crime come from different geographical areas. The consistent use of computers and internet has risen in the past few years due to the dropping prices of computers device and low cost of internet connectivity. The other factor that has facilitated the use of computer and internet, is the fast accessibility as well as friendly and easier mode of usage. The crimes that are committed in computer are mainly materials that contain software, the use of a tool such as the processor and data. These criminal activities that are committed on computers include hacking, use of unauthorized cyber service, denial of service attacks as well as cyber vandalism. The origin of computer crime can be traced back to around 1940s when the society found some difficulties while handling the computers. This was as result of the advancement in technology that proved to be so complex than ability of the brain of a human being. This led to designing of computer that would be most creative with a powerful invasion that would be friendly to the human’s brain. This decision was reached due to the important role that the computer played in the society. This advancement in technology led to the increase spread of information in the society. Criminals also found chance of engaging their criminal acts when the opportunity presented itself. People from different place or nations have different approach to the laws that they regard to as the laws of computer crimes. Many cases share the same features of violation. So it is important to come up with a common way of stopping the access law. This step can also be seen as blocking the unauthorized access, though this element of prohibiting unauthorized persons is very basic. It can protect the computer from fraud and damages that can be caused by any unauthorized person that may have access to the computer. Measures should also be taken to protect damage of data. Damage can be caused to data can be caused by inflicting harm to a computer by a criminal act of imposing liability to the amount of data in a computer. In order to curb this illegal act of damaging data, a nation or the authorities concerned should combine a single prohibition which has best requirements to deter unauthorized access of the computer (Gibson, Stan). If in any case there is a perpetrator that is found practicing in causing the data damage. Then the perpetrator should be punished by depriving them the privileges of using the computers. Confidentiality and the integrity of data should also be looked at so that it helps prevent damages that are caused on data. The internet has become a global passage of information, due to this children have been exposed to pornography and asexual exploitation. This crime is classified in two categories; the first offence involves showing video footage of nude child. Computer is involved in this situation through the sending and receiving images of the explicit sexual activities of a minor. The second situation may comprise both the child and an adult involved in a sexual intercourse So this has left the government and the parties that are involved to create acts that will protect the users of the computer. Any perpetrator who is found committing computer crimes intentionally or knowingly dealt with. The government should also have legislation that comprise of all the computer crimes (Gibson, Stan). Lastly the society and the government should be able to understand the computer crime laws. This is a very vital move that help both parties in understanding how important is prohibiting on unauthorized access to a computer statutes. For instance, when looking at the case summary of PIPEDA #2009-008 it shows that the crimes that were being committed on facebook were either based on knowledge or consent. The findings of this case study proved that the convention of these any act on facebook was not justifiable but later concluded that the allegations that were presented were well-founded and resolved. Work cited Cavanah, Cassandra. "Firewalls Help Protect Internet from Attack of the Hackers. 1994. Cavanah, Cassandra. Get the Bugs Out: Cure Your Computers Ills with Anti-Virus Software. 1997. Gibson, Stan. Hacking: Its a Mad, Mad, Mad New World. 2001. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Computer Crime and the Measures That Can Curb the Crimes Caused On Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Computer Crime and the Measures That Can Curb the Crimes Caused On Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1816664-2-there-are-potentially-a-variety-of-ways-in-which-the-various-so-called-privacy-torts-may-provide-protecting-from-various-behaviours-that-privacy-statutes-such-as-pipeda-may-not-compare-and-contrast-the-types-of-behaviour-addressed-by-pipeda-or-for
(Computer Crime and the Measures That Can Curb the Crimes Caused On Essay Example | Topics and Well Written Essays - 1250 Words)
Computer Crime and the Measures That Can Curb the Crimes Caused On Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1816664-2-there-are-potentially-a-variety-of-ways-in-which-the-various-so-called-privacy-torts-may-provide-protecting-from-various-behaviours-that-privacy-statutes-such-as-pipeda-may-not-compare-and-contrast-the-types-of-behaviour-addressed-by-pipeda-or-for.
“Computer Crime and the Measures That Can Curb the Crimes Caused On Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1816664-2-there-are-potentially-a-variety-of-ways-in-which-the-various-so-called-privacy-torts-may-provide-protecting-from-various-behaviours-that-privacy-statutes-such-as-pipeda-may-not-compare-and-contrast-the-types-of-behaviour-addressed-by-pipeda-or-for.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

Monopolists Are Free from Competition

(Your name here) (Your here) (Type of assignment e.... .... Test assignment) (Date of dropping the assignment) Macro & Micro economics a.... The monopolists are free from competition.... They are the price setters and not price takers.... The absence of competition allows the monopolists to increase the price at any time because there is no other outward source to react to their new price....
10 Pages (2500 words) Essay

Phases of a Project Lifecycle

Some of the equipment used during setting out a project for example for a company such as IT Software Company is; notebook computer which is a very important tool .... hellip; According to the research findings, it can, therefore, be said that initiation phase is the first phase of the project lifecycle....
7 Pages (1750 words) Assignment

Cyber Harassment Laws

hellip; In order to curb this highly rising social menace, different states have enacted laws that would ensure that would ensure that incidences of cyber-harassment are reduced.... This discussion will focus on a review of cyber-harassment laws; basically attempting to investigate the positive attributes of these laws; inadequacies associated with these laws as well as the provision of recommendations on how the application of these laws can be improved....
4 Pages (1000 words) Thesis

A Link between Indian Objectification and Women Sexualization

hellip; An accepting of a woman as a sexual object by means of spreading her hyperbolized and symbolized image in films, computer games, and pop industry nowadays is widely criticized by fighters for woman rights.... A Link between Indian Objectification and Women SexualizationAn accepting of a woman as a sexual object by means of spreading her hyperbolized and symbolized image in films, computer games, and pop industry nowadays is widely criticized by fighters for woman rights....
2 Pages (500 words) Essay

SABB Internet Banking and Online Phishing

There is wide publicity surrounding phishing to warn customers of internet banking that they could fall victims of such crimes (Legard, 2003).... hellip; A variety of cues can be used to avoid being a victim of phishing.... urther, the phishing attacker can use flaws in a trusted website's own scripts against the victim....
6 Pages (1500 words) Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us