Thursday, March 7, 2019

Crytography & Computer attack Essay

Computer plan of attack involves operations that deny, disrupt, destroy or degrade nurture stored in reckoners and computer networks. In otherwise words, computer attack is known as electronic attack used a impinge onst a computer. The attackers of stored information in computer be called hackers or intruders. A difference occurs between computer attackers in the level of scientific discipline and sophistication of the attack (Roman Peter, 2007). More recently, attackers confuse developed skills that make it viable for them to access other peoples information by apply automated jibes.The automated and sophisticated tools atomic number 18 cheaply available in the market making it possible to access other peoples computer. The major(ip) incidents of computer attacks include bringing down of eBay, Yahoo and Amazon. com by hackers. The motives for computer attack ar to destroy data or information and access person information for political, social and financial gain. On indi vidual basis a hacker can attack personal computer to destroy information on revenge mission, or out of grudge.Attackers of computers oddly in political perspective aim at gaining information for their competitor candidates to outperform him or her during campaigns (Rhodes Mary, 2003). In the context of business, hackers go for core variables requirement to compete in global markets such as information link up to marketing strategies. Hackers of computer information do so once they have a particular opportunity such as use of senior high speed digital subscriber line. It is an opportunity that has been used by hackers to gain access to private information.The internet is known as an important tool in education or business but some off caners run across ways of using internet provided in cyber to commit offensive activitys. The offenders satisfy their inescapably while putting their victims at risk. There are a subdue of cyber execrations popular among internet offenders su ch as credit card fraud, cyber stalking, individuality theft, software piracy, cyber terrorism and phonograph. These crimes are very common in the innovational society as internet is cheaply available in cybercafes and fluid phones. The children and young generation are exposed to cyber risks such as dependence to phonographic sites.Software piracy is another common cyber crime in the forward-looking world of advanced technology. Cyber crimes are as dangerous as either other form of crime and require justness enforcement officers to be calculated when handling cyber criminals. As a complex issue some offenders are prosecuted while others are set free. Three main reasons that lead to pursuance of some criminals and release of others include first, there are no outlined penal laws relating to cyber crimes (Wible Brent, 2003). This means that some individuals search information from the internet and end up exceeding certain legal provisions without their knowledge.Such individu als are cyber criminals but are never arrested especially employees working in a networked office. Second, considering whether an individual has or has not committed a previous abomination without computer or an offense similar in nature. Individuals who are convicted of other offences outside the cyber such as bank robbery are prosecuted of cyber crime once they are considered as suspects. Third, children below the age of eighteen historic period which is considered as the average age for a person to be prosecuted are set free while they are cyber offenders.The law about cyber crime favors some offenders while others are charged with criminal activities. Children are the major victims in cyber crime and yet are protected by the law owing to age factor. References Roman Peter, 2007, Computer Crimes, American Criminal law of nature Review, Vol. 44. Wible Brent, 2003, A Site Where Hackers Are Welcome Using Hack-in Contests to Shape preferences and dissuade Computer Crime, Yale Law Journal, Vol. 112. Rhodes Mary, 2003, Computer Crimes, American Criminal Law Review, Vol. 40.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.