StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Article for Geek Wannabe News - Report Example

Cite this document
Summary
This paper 'Article for Geek Wannabe News' tells that personal computers are now installed with passwords that are too hard to hack; this helps ease security and secrecy. This reduces the owner's computer's opening, a condition that may result in one of the crimes like altering major information on the computer…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.5% of users find it useful
Article for Geek Wannabe News
Read Text Preview

Extract of sample "Article for Geek Wannabe News"

ARTICLE FOR GEEK WANNABE NEWS Technology advances in computer crime for the last 35 years in wannabe geek Instauration of passwordPersonal computers are now installed with passwords that are too hard to hack this helps to increase the owner security and secrecy. This helps to reduce the opening of the owner’s computer a condition that may result in one of the crimes like, alteration of major information in the computer. These demands that the subscriber must use his or her account thus helping to get the suspect in case of crime Use of USB flash drive This has encouraged easy transfer of data because the devices are becoming smaller with great memory. These has enabled user to carry their information therefore the risk of destruction of information is reduced. Presence of firewalls Firewall is a protective shield or wall that prevents attacks from happening on a computer or computer network; it may recognize millions of data stream it receives and automatically block any type of access to the personal computer. This is done to prevent spywares, viruses and hackers. This restricts the access of some internet sites which may install viruses to the computer. The firewall only restricts sites that do not contain any information of much importance to the person. Provision of antivirus It helps to prevent the crushing of the personal or organization computers after entry of virus created by the information criminals who intend to destroy computer system in the network. The antivirus protects the computer by combining with the detected virus in the network. Power supply The computer is protected in that before it switches off it warns the user before it goes off. The disk activity light the moment the computer is switched on, these services as a security on the working of the computer. Tracking services The modern technology has enabled the tracking of the crime suspects, these may be done presence of a common message control centre where the messages and mails are screened and any mail containing any message of criminal attempts are thoroughly dealt with, these activity helps to control any crime occurrence. The criminals are then caught and confined in a court of law. Computer crimes Crime is any act that violates certain set law, computer crimes are crimes that do not mostly violate any formal rules but are against the traditional ethics or are against set rules like, the Electronic Communication Privacy Act (ECPA). Helps of computer technology to criminals Criminals use the advantage of computer technology and involve in activities like, pornography, theft of services, unauthorized access to other peoples sites, viruses, computer fraud, extortion, denial of services, forgery of documents, property theft like computer hardware and chips, sabotage (data manipulation or even complete destruction), embezzlement, espionage and terrorism. This activity helps the criminals to survive in their areas of operation. Pornography Criminals use the advances of technology to produce movies that portray nude images. These help them to earn a lot of money. These affect the behaviors of most of the youths in the whole world, which use it as they become sexually actively. Theft of services Most criminals use the advanced technology to operate their services without paying any cost; as they establish a leakage in technology in a given service delivering company, mostly during the system repair. The criminals may use a more advanced technology beyond the company’s level. Unauthorized access to other peoples sites Technology criminals get access to sites of organizations or individuals where they tamper with some information. These may be due to hacking of the original password these is regarded as irregular. These may result in even fraud because the criminals may have access of money transfer. Forgery Criminals may take advantage of technology where they may create fake documents like academic certificates, receipts and other documents. This act may cause fraud to certain facilities. Viruses Moreover so criminal may install viruses into a certain document resulting into complete destruction. These may be done to some documents that contain crucial information that may be used to convict someone in a court of law. It may also be used as weapons of war were the warring parties may use it as a mean of defense, these may result in massive destruction of more important information. Extortion Criminals may use the well established information sector to extort from family or country on kidnapping one of a loved one or on kidnapping property. This is seen in pirates who capture ships in the high seas and demand for ransoms so as to free the cargo. Embezzlement Criminals may use the well established technology to steal money from organizations where they work; these may be done by partial manipulation of data. They may add some figures to the real documents a situation which may go unnoticed. Criminals may produce some art work under the name of the original actor. These may result in low Piracy of art works Incomes to the owner and most income benefiting the criminals. Property theft The efficient technology may result in theft cases to most of the parts of a computer like the hardware, chips and other parts of great values that may operate in different computer designs that are in current demand (Stanford the Demo 2005). Sabotage This is a situation where unscrupulous criminals alter or even destroys the present information completely, these may greatly affect the investigations that had later been conducted, or the research that is being conducted, and this information in removal the evidence that may be demanded in solving a court a court of law may be destroyed (Null 2006, p 67). This act may help to make the suspects free action that may increase the rate of crime because most of the criminals go scot free Denial of services This may occur as the criminals may pretend to have offered the service while in real sense they have not provided any service. Some services like the antivirus may be outdated and may not protect the computer system (Dale, 2007, p 45). Assistance in Crime investigation Crime investigation should be started immediately following the report of any alleged criminal activity. Crime investigations have been made easier because in case of suspected crime the appropriate authorities may be informed in time an action that may prevent the occurrence of the organized crime. The technology may also help in instauration of search access controlled systems and encrypted files during a search these may help to get suspect whether physically or logically. Some may use CPU key locks these may create a partial obstacle while other types of physical access control system may be very hard to break. These may help to prevent or even capture the crime suspect. Crime investigations have been made easier because in case of suspected crime the appropriate authorities may be informed in time an action that may prevent the occurrence of the organized crime. The technology may also help in instauration of search access controlled systems and encrypted files during a search these may help to get suspect whether physically or logically. Some may use CPU key locks these may create a partial obstacle while other types of physical access control system may be very hard to break. These may help to prevent or even capture the crime suspect (Englebart 1962, p 34). The improved technology may also help to the crime investigator to monitor criminals these may be used in times of war were aero planes installed with modern technology gadgets may be used to view the rebels, it may also be used to view the criminals hide outs. The improved technology may be used to access fake documents or money therefore helping in the capturing of the suspects. The modern technology helps to distinguish between original and fake documents. High technology helps in tracking of criminals this may be used to criminals who have kidnapped someone and are asking for a ransom, it may also be done to criminals who have stolen cars, phones or any other property that may emit signals (Dale, 2007, p 45). The technology helps to monitor the behaviors of citizen or prisoners. These is because management may watch them from many points as cameras, may be installed in different points without the knowledge of the people under supervision. These may help to reduce the rates of crimes. The high quality technology reduces the costs of investigation as the work is done automatically. This also helps to increase the quality of final results of judgment as there may be no biasness during data collection. Reference list Dale, N & Lewis, J (2007). Computer Science Illuminated, Third Edition, Jones and Bartlett. Englebart, D.C. (1962). Augmenting Human Intellect: A Conceptual Framework, Report for Director of Information Sciences, Stanford Research Institute. Null, L & Lobur, J (2006). The Essentials of Computer Organization and Architecture, Second Edition. Jones and Bartlett. Stanford (2005) the Demo [Online]. Available at: http://sloan.stanford.edu/MouseSite/1968Demo.html [Accessed 2, Dec 2011] Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Article for Geek Wannabe News Report Example | Topics and Well Written Essays - 1250 words, n.d.)
Article for Geek Wannabe News Report Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1762523-article-for-geek-wannabe-news
(Article for Geek Wannabe News Report Example | Topics and Well Written Essays - 1250 Words)
Article for Geek Wannabe News Report Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1762523-article-for-geek-wannabe-news.
“Article for Geek Wannabe News Report Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1762523-article-for-geek-wannabe-news.
  • Cited: 0 times

CHECK THESE SAMPLES OF Article for Geek Wannabe News

Business News Event

Date Business news Event The technology industry has been characterized by the strong competition and fast changing technology used in the manufacture of the different gadgets.... Managing Competition remain an important facet in the survival of companies which operates in such environment....
4 Pages (1000 words) Article

Are Free-Range Eggs Safer by News Week

by news Week" focuses on the article which discusses and examines the illnesses that can be associated with food.... This paper 'Are Free-Range Eggs Safer?... The United States has often been referred to as a melting pot.... This reference makes types of food available to the individual visiting the US....
1 Pages (250 words) Article

Analysis of Haiti Devastated by Massive Earthquake Article by BBC News

The paper "Analysis of Haiti Devastated by Massive Earthquake Article by BBC news" highlights that millions of people were affected.... The article on BBC news is about Haiti that suffered from a massive earthquake of magnitude 7.... Many nations provided their aid....
1 Pages (250 words) Article

Food Industry in the News

The two endeavors just came up as ideas to the responsible chefs, and now have In the news In the news When it comes to the food industry, s are attracted to munchies that have an attractive ingredient(Koji, 2013).... As a majority of restaurants have put it, they refer to this as a "wacky" combination....
1 Pages (250 words) Article

Freedom vs. Security in the US

security in the United States has been witnessed from the past....
2 Pages (500 words) Article

Scientific Inventions and Discoveries

Alternatively, the atomic-age architecture that defined the ‘50s and Science news Article Article I Scientific inventions and discoveries have resulted to numerous improvements and developments unlike in the past.... According to Schulmiller's article, technological inventions form the backbone of scientific pragmatism as demonstrated by the 1,500 pairs of Marty McFly Air Mag… Additionally, hysteria about the future is heightened by tweets and photoshop technologies that attempt to provide humanity with an illusion of good times ahead (Schulmiller 2)....
2 Pages (500 words) Article

Analyzing the Article on General Motors

According to a CNN article, “GM recalls will mean smaller bonuses for factory workers”, by Wallace (2014), General Motors decided to recall vehicles with defects.... One of the defects included among others, ignition switches that had begun to cause automotive accidents.... It… This decision had to be difficult as well....
2 Pages (500 words) Article

Fame and Celebrity

The article "Fame and Celebrity" points out that Fame has always been a coveted material from times immemorial, and there are innumerable instances of both men and women who have run behind this ignis fatuus; however it has always been the fortunate few who ultimately reach of success.... nbsp;… As one achieves stardom and changes his lifestyle by running after the perks that come with this elevated status, the drugs and alcohol and the fast life, all combine together to create a world of fantasy; but unheeded, just behind the mantle of this glamour filled celebrityhood, often lies despair, loneliness, and death....
9 Pages (2250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us