1. Cyber laws
The concept idea of cyber terrorism has always been a great treat for computer
technology since the first computer was invented in the late fifties; and grown up with the
technology that has developed extremely. The use of the computers within the business
and government sector have rapidly increased; this therefore provides a whole new
prospect for a distinctive criminal to prosper in most cases. The advances in the computer
technology has brought a new methodology in crime. Electronic crime has been
responsible for some of the most financially devastating victimizations in society.
In the recent past, society has seen different kinds of unauthorized access into classified
government computer files, phone card and credit card, and electronic emails. All these
crimes are committed in the name of "free speech." These new breed of criminals claim
that information should not be suppressed or protected and the information should be
freed. They think that the crimes they commit are really not crimes at all. Noone can deny
that the internet is the most useful tool for computer abusing.
There are many forms of computer abuse and yet they have not come to any solution.
Computer crime appears in a number of forms; malicious damage, un
. . .
They find these crimes less violent or public. Many adults go on to the net and access
pornographic material that would be unsuitable for children. Anyone or person can find
child pornography on the internet with just a few clicks of the mouse using any search
engine. These crimes are all that have been started with someone who accessed to others
computer and start getting into other peoples computer files. This brings a need for a case
of ethics in the Internet realm. Another reason for computer crime not being reported is
when the crime is discovered companies demand tremendous sums of money. To prevent
children from these actions, the pornographic sites has set, user and password login
protection for accessing into them illegally.
There are people who accept pirated software, pornographic pictures, animations, and
texts, instead of buyin registered ones. The pornographer will then post the pictures on
their web site. These numbers are looked at by hackers and then used again, when the
hacker calls the number he is accessed with a logon prompt, this is where the hacking
really begins, the hacker tries to bypass this to gain access to the system.
The computer systems are under attack from a multitude of sources. Many children first
come in contact with the Internet at a very young age. If any unauthorised access
happens, that carries a penalty of six months imprisonment. According to this, sex
becomes more popular and is spreading to children at a younger age.
On the other hand, if we look at the ethics of the internet, in conditions of the terms of
cyber crimes, we can say that many racy, illegal, and controversial materials are available
on the Internet such as pornography and pirated software; on the other hand, many
educational tools are on-line as well.
Common topics in this essay: