Paper Details  
 
   

Has Bibliography
7 Pages
1858 Words

 
   
   
    Filter Topics  
 
     
   
 

Hackers

In the late 1970s, hackers were people who enjoyed learning the details of computer systems. Today, hackers (or crackers) refer to people who break into computer systems. Some malicious hackers use Trojan horses, logic bombs, and other means to infiltrate computer systems. Breaking into other computer systems is called electronic trespassing. This paper will speak of :On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy, and Freedom: The Delicate Balance Security and Reliability Safe ComputingComputers are used to break laws as well as uphold them. Computer crime involves: Theft by Computer Software Piracy and Intellectual Property Laws Software Sabotage Hacking and Electronic TrespassingAccording to the FBI, the average computer crime is worth $600,000. More than 40 percent of corporate, university, and government sites report at least one break-in per year. The typical computer criminal is a trusted employee with no criminal record.Hacker Kevin Mitnick is alleged to have broken into several major organizations'computer systems, including those of Sun Microsystems, Motorola, and the Pentagon. Mr Mitnick was ARRESTED on February 15,1995, after an FBI computer expert Tsutomu Shimomura tracked him down. Mitnick, the first hacker ever to have appeared on an FBI wanted poster. With 25 counts of alleged federal computer and wire fraud violations still pending against him, the criminal prosecution of Kevin Mitnick is approaching its most crucial hour. In June of 1999, Kevin was sentenced for certain admitted violations of his supervised release and for possession of unauthorized access codes. The court imposed a sentence of 22 months instead of the 32 months sought by the government. Since Kevin has been in custody since his arrest in February 1995, this sentence has been satisfied. Kevin has experienced years of legal battles over alleged violations of the conditions of his supervised release and ...

Page 1 of 7 Next >

    More on Hackers...

    Loading...
 
Copyright © 1999 - 2024 CollegeTermPapers.com. All Rights Reserved. DMCA