• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Communications
 

Communications

on

  • 187 views

 

Statistics

Views

Total Views
187
Views on SlideShare
187
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft Word

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Communications Communications Document Transcript

    • CommunicationsNew times bring new crimes. It’s a story as old as humanity and as new as the Internet. First comes cars,and then car thieves follow. Telephones are followed by telephone fraud. Now we’ve got computers…. Tomake home, school, and office life easier, we rely on computers. As a result of this dependency, computeruse grows everyday. Along with this growing use of computers comes widespread computer crime.With the Internet becoming increasingly popular, more and more people are becoming computer literate,and networks are becoming more readily accessible.People think that computer crime is a fact that started around of 1980s that is not true. We know that the firstrecorded computer crime took place in 1958 and the first prosecution for computer crime came about in1966. “A few years after the IBM begun marketing its first line of business computers. By the mid-1970sscores of such crimes were being reported every year and yearly losses were estimated to be as high as$300 million” [Mandell, 1992]. Computer criminals are active for more than 30 years. At this point it is usefulto collocate some past important cases:“1964: Robert F. Hancock attempted to sell $5 mi...“The FBI said that the dangers of cyber crime were rising because of the increased availability of hackingtools on the Internet as well as electronic hardware such as radio frequency jamming equipment. “Hackersare school dropouts and job changers who turned to computing as a way of outsmarting everyone exceptthe other members of their social group” . Subject: Why the Rise??The rise in computer crime can easily be blamed upon the increasing number of users. We have alreadyseen that some hackers strive to access closed computer systems not for pecuniary gain but as intellectualexercise.Hacking really came into existence after 1980s as a result of telecommunication growth as well as highcomputer literacy. The remainder were dismissed for lack of evidence. Up to 40% were turned down for lackof evidence of criminal intent, weak or insufficient evidence or no apparent violation of law. 5 billion worth ofsoftware is illegally copied and distributed worldwide. It provides the same opportunities for crime that thereal world offers. Hacking include a broad-range of computer-helped activities. Finally we can say that allhackers cannot be characterised as benevolent nor nasty or nuisance. Hackers seem to break into computersystems for the intellectual challenge. My investigation also continued by a wider question: is it legal to haveaccess and knowledge on information? As I have mentioned previously the majority of hackers does nothave malicious purpose. A poll conducted this year by the Information Technology Association found 61% ofthose surveyed said rising cyber-crime made them less likely to do business over the Internet; 62% saidthey did not believe enough was being done to protect consumers against cyber-crime. These are based onauthorisation and "need to know" basis.