Paper Details  
 
   

Has Bibliography
11 Pages
2748 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime and Ethics

mage to a computer system. The motivations behind crackers' actions are either profits, revenge, or a mixture of the two. Other computer criminals include terrorists, company competitors, and aggravated employees. Aggravated employees are a company's worst nightmare since they have easy access to the companys system, and are usually fired or leave on bad terms. Competitors will often do whatever is necessary to get an edge on their industry leaders by riffling through their competitors' trash, bugging phone lines, and now breaking into their competitors' networks in an attempt to gather inside information. Terrorists are becoming more computer literate because they realize the amount of information regarding the government defense are stored and found on computers. Terrorists are also targeting technology and utility companies because they realize the damage caused would be wide spread and devastating. There are six common types of computer attacks:Military/Intelligence AttacksBusiness AttacksFinancial AttacksTerrorist AttacksGrudge AttacksReasonless AttacksComputer criminals have broken into the military's system many times and learned such valuable information as military exercises, satellite repositioning systems, FBI/CIA investigations, etc. Our national security is at jeopardy simply because the militarys system is susceptible to computer crime just as is any network system. The U. S. Air Force once hired a hacker to try to break into their systems. The hacker was successful at the break-in and reported it to military officials. Two weeks later, he was asked to try to break into the system again. This time it only took fifteen seconds to get back into the system. The government needs to find a way to protect their information, themselves, and us more securely. Attacks on businesses are rapidly becoming more widespread. 54% of U. S. companies reported losses related to computer crimes. Most of these crimes committed we...

< Prev Page 2 of 11 Next >

    More on Computer Crime and Ethics...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA