Monday, March 25, 2019
Computer Crimes :: essays research papers
Computer CrimesComputer crimes are on the rise 1 in 10 Americans experience some form ofa malicious snipe on their figurer system. If you pay attention to the restof this speech communication you testament understand how a Hackers mind works and how to defendyourself from them. In this speech I will tell you why and how people breakinto estimators, what sorts of perplexity they cause, and what kind of punishmentlie ahead for them if caught.     Hackers and Crackers break into computer systems for any of a widevariety of reasons. Many groups break into computers for crown gain whilestill others do it as a manner to pass time at work or at school. For around itsa thrill to figure out how to break into a computer. al close people never have anyintention of causing harm. I believe that for the vast majority of people itsmerely the thrill of the " bleed" at pushes them to such great lengths. Manyemployees that work in titanic corporations feel that t hey dont get paid as muchas they should. whence if they have high security clearance they are able tocapitalize from that by selling the data they have access to on the black-market.Whether it be Ford Motor companies plan for the 1999 F-150 or spec sheets forthe militarys saucy bomber it happens everyday. Too by left is a drawing thatillustrates the method that most Hackers use to take over your computer. Eversince the dial-up connection was invented anyone with a modem had the tycoon towreck any one of g-forces of computers.One of the most talked about forms of computer crime is computer viruses.A computer virus is a mild but highly destructive computer programme written by anunscrupulous computer Hacker. Back in 1984 a 17 year erstwhile(a) computer Hacker singlehandedly brought down four hundred thousand computers in a matter of hours.Too my left is a graph depicting the of computer crimes comited from 1988 tillnow. Some Hackers create a program called a worm. A worm is a piece ofmalicious software package and is part of the virus family. People write worms totransfer money from believe accounts into their own personal checking account.Another way that Hackers cause trouble is by altering the telephone switchingnetworks at MCI, AT&T, and Sprint. By doing this they are able to take care toany conversation they choose. Often-times they will listen in on the Police andFBI communicating with each-other. This allows them to move to a new location
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment