Paper Details  
 
   

Has Bibliography
13 Pages
3167 Words

 
   
   
    Filter Topics  
 
     
   
 

The Growing Threat of Computer Crime

the air. This is just the tip of the “iceberg”.Business. Most banking today is done by electronic impulse. Therefore, access to business computers equals access to money (and lots of it). Convicted computer hacker, John Lee, a founder of the infamous “Master’s of Deception” hacker group stated that he could change credit card records and bank balances, get free limousines, airplane tickets, and hotel rooms (without anyone being billed), change utility and rent rates, distribute computer software programs free to all over the internet, and easily obtain insider trading information. Imagine………this is just one person. Think of all the hundreds of “hackers” that are out there.Computer stalking. One type of computer criminal rapidly emerging is the “cyber stalker”. One such stalker, the pedophile, surfs the net looking to build relationships with young boys or girls and then sets out to meet them in person to pursue his/her sexual intensions. This type of activity also leads to sellers of child pornography over the internet.Virtual crimes. Stock and bond fraud is already appearing on the internet. Stocks and bonds that appear on the market are actively traded (for a short period of time) and then disappear. These stocks and bonds are nonexistent-only the electronic impulses are read. One must note, however, no matter how clever the hacker, the most serious security threat in most enterprises is password theft. Password stealing is the “holy grail” of hacking. Once a username/password combination has been found, the hacker has free rein to exploit that user account. Firewalls, intrusion detection systems, encryption, and other countermeasures are powerless. Here, hackers an get a hold of a valid user name and password, plus the right URL or dial up number, and can use these to steal your sensitive data. Hackers can also use programs such as &...

< Prev Page 3 of 13 Next >

    More on The Growing Threat of Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA