.

Sunday, January 20, 2019

Crytography & Computer attack Essay

calculating machine approaching involves operations that deny, disrupt, destroy or attaint learning stored in computers and computer networks. In other words, computer attack is known as electronic attack used against a computer. The attackers of stored randomness in computer atomic number 18 called cyber-terrorists or intruders. A difference occurs mingled with computer attackers in the level of skill and sophistication of the attack ( roman print Peter, 2007). much recently, attackers have developed skills that make it likely for them to access other multitudes tuition by using automated tools.The automated and advanced tools argon cheaply available in the market making it possible to access other peoples computer. The major incidents of computer attacks overwhelm bringing down of eBay, Yahoo and Amazon. com by hackers. The motives for computer attack atomic number 18 to destroy data or information and access individual information for political, social and financial gain. On individual basis a hacker can attack personal computer to destroy information on revenge mission, or out of grudge.Attackers of computers especially in political military position aim at gaining information for their opponent candidates to outperform him or her during campaigns (Rhodes Mary, 2003). In the context of business, hackers go for core variables necessary to compete in worldwide markets such as information related to marketing strategies. Hackers of computer information do so once they have a particular opportunity such as use of high speed digital lector line. It is an opportunity that has been used by hackers to gain access to private information.The net profit is known as an important tool in education or business but whatever offenders find ways of using cyberspace provided in cyber to commit offences. The offenders satisfy their needs musical composition putting their victims at risk. There atomic number 18 a number of cyber crimes popular among net offenders such as credit card fraud, cyber stalking, identity theft, software piracy, cyber terrorism and phonograph. These crimes are very common in the modern society as internet is cheaply available in cybercafes and mobile phones. The children and young generation are exposed to cyber risks such as addiction to phonographic sites.Software piracy is some other common cyber crime in the modern world of advanced technology. Cyber crimes are as dangerous as any other form of crime and require law enforcement officers to be careful when handling cyber criminals. As a complex issue some offenders are prosecuted while others are tag free. Three main reasons that lead to prosecution of some criminals and release of others involve first, there are no defined penal laws relating to cyber crimes (Wible Brent, 2003). This means that some individuals search information from the internet and end up exceeding original legal provisions without their knowledge.Such individuals are cyber criminals but are never arrested especially employees working in a networked office. Second, considering whether an individual has or has not committed a previous horror without computer or an offense similar in nature. Individuals who are convicted of other offences outside the cyber such as bank robbery are prosecuted of cyber crime once they are considered as suspects. Third, children below the advance of eighteen years which is considered as the average age for a person to be prosecuted are set free while they are cyber offenders.The law about cyber crime favors some offenders while others are charged with criminal activities. Children are the major victims in cyber crime and soon enough are protected by the law owing to age factor. References Roman Peter, 2007, Computer Crimes, American Criminal Law Review, Vol. 44. Wible Brent, 2003, A Site Where Hackers atomic number 18 Welcome Using Hack-in Contests to Shape preferences and Deter Computer Crime, Yale Law Journal, Vol. 11 2. Rhodes Mary, 2003, Computer Crimes, American Criminal Law Review, Vol. 40.

No comments:

Post a Comment