Computer Crimes of Today Essay

This essay has a total of 1472 words and 7 pages.

Computer Crimes of Today

Computer Crimes on the Internet

Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayis computer hackers.
Software piracy is a major crime on the Net.
$7.5 billion of American Software is stolen each year.
Industrial Espionage is gaining access to remote sites illegally.
Stealing of information from corporate sites is extremely illegal.
Password Sniffers are used to get someoneis password.
IP spoofers changes your identity.
Many things can be stolen from companies.
III. Email hacking is common.
Mail bombs are thousands of messages send to a single address.
Email forgery can cause people reputations to get ruined.
Anonymous Email is illegal.
Fraud is very common.
Pyramid schemes are nothing but a scam.
Credit card fraud is a half billion dollar a year scam.
Computer viruses are destructive to computers.
Computer viruses can be attached to Email messages.
99% of all computer viruses are detectable.


Computer Crimes on the Internet


Its the 90is, the dawn of the computer age. With technology changing and evolving
everyday, it may seem hard not to slip behind in this ever changing world. The Information
Super-Highway has been following computers throughout the past few years. Along with the
Internet, an emerging group of elite cyber-surfers have turned into todayis computer
hackers. Most people donit know about them, most people donit know they exist, but they
are out there, lurking in the shadows, waiting for there next victim. It can be a scary
world out there (Welcome to the Internet). In reality it is not nearly as bad as it
sounds, and chances are it wonit happen to you.

There are many fields of hacking on the Internet. The most popular type of hacking is
software piracy. iAccording to estimates by the US Software Piracy Association, as much as
$7.5 billion of American software may be illegally copied and distributed annually
worldwidei(Ferrell13). Hackers ipiratei software merely by uploading software bought in a
store to the Internet. Uploading is send information from point A(client) to point
B(host); downloading is the opposite. Once it is uploaded to the Internet, people all over
the world have access to it. From there, hackers trade and distribute the software, which
in hacker jargon is warez.

Industrial Espionage is another main concern on the Internet. Most recently, the FBIis
World Wide Web page hacked and turned into a racial hate page. Anyone can access files
from a WWW page, but changing them is very hard. That is why most hackers donit even
bother with it. CNET stated iThis Web site should have been among the safest and most
secure in the world, yet late in 1996, it got hacked.i(Ferrell18). To change a web page,
hackers simply upload a new, modified version of the web page, in place of the original.
But fortunately, almost all Internet Service Providers (ISP), the computer you dial to for
Internet access, have protection called a firewall, which kicks off all users trying to
gain access of change information that are not authorized. iTheft and destruction of
company files is increasing faster than the ability to stop iti(Rothfeder170).

Another field of hacking on the Internet is Electronic-mail hacking. A hacker can
intercept Email enroute and read it with no detection. To safeguard this, companies use
encryption programs and no one but the sender and its recipient can read it(Rothfeder225).
A mail bomb is another type hack on the Net. iA mail bomb is simply an attack unleashed by
dumping hundreds or thousands of Email messages onto a specific addressi(Ferrell20). The
only way to fix this problem is to either sit there and delete each message one by one, or
to call you Internet Service Provider for help. Email forgery is also common. A hacker can
change the return address on any given piece of Email to anything they want, such as
dougerty@monmouth.com. This is illegal because you can use someone elseis address to send
false Email to people.

Continues for 4 more pages >>