We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Crimes Against Information Systems Analysis - Essay Example

Comments (0)
At one time, an individual with a gun could decimate several people and would be highly feared. Now a mischievous individual with access to informational systems is thought not only to be menacing but also lethal to integral parts of society. Criminals no longer opt to torment a few victims using firearms or explosives; rather, they chose to inflict terror on the mass by crippling or even crashing critical informational systems…
Download full paper

Extract of sample
Crimes Against Information Systems Analysis

Download file to see previous pages... Cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population." (p.8) Over the years, the level of cyber-terrorism has evolved. Years ago, hackers attained satisfaction by simply breaking into a system (Wilmot, 2004). However, Littleton (1995) still regards hackers as dangerous and further implies imminent danger by questioning the ability of a hacker to become a cyber-terrorist. Wilmot (2004) contends that hackers' abilities to "crack passwords or find a back door route through a security firewall" shows that hackers can easily use a simple act to corrupt data in high technology. (p. 287). Though hackers implement a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as modern day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information. However, the sophistication of cyber-terrorists' methods correlates with the degree of their motives.
An intent
Motives and Methods of Cyber-Terrorists
An intent of cyber-terrorist includes causing a devastating amount of damage, while remaining elusive. To illustrate the elusiveness of a cyber-terrorist, Littleton (1995) uses two examples from the late 1980's. The identification, trial, and conviction of Robert T. Morris transpired only because he spoke of his creation, the 1988 Internet Worm, to several people. Rather, the author of the famous Michelangelo virus remains unidentified and escaped consequences altogether. The low risk of being captured coupled with the benefit of easily gaining access to restricted areas makes the crime of cyber-terrorism more appealing to criminals.
Motives of cyber-terrorists range from mischief to malice. Today's juveniles have joined the cyber-terrorist realm by defacing Web sites. However, Watson (2002) regards the less serious crimes as highly consequential. When a site is defaced, its information is altered. Misleading information ultimately deceives viewers of the site and result in decrease of confidence and capital for owners of the site.
Both hackers and crackers gain access to exclusive information by deciphering protective codes (Wilmot, 2004), which Littleton (1995) claims is not hard to do. A mischievous hacker seeks to only occupy an area considered off limits. On the other hand, a malicious cracker not only breaks codes to enter off-limits areas, but he or she seeks to vandalize or defile the area by causing immediate damage or planting viruses which slowly infiltrate and destroy systems that operate as critical infrastructures (Morris; Wilmot, 2004).
Impact of Cyber-Terrorism
According to Wilmot (2004), citizens cannot function without the critical infrastructures of their communities. One part of the critical infrastructure extremely vulnerable to cyber-terrorism is the public safety system. Branches of the public safety ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Crimes Against Persons
Rape is the forcing of someone to have intercourse with you against their will. Murder is the taking of a life without provocation and does not include self defense. Robbery is when you take something from someone else such as a purse or cash. This is usually done while threatening them with a weapon of some sort.
2 Pages(500 words)Essay
Crimes Against the Public
v Wise, 221 F.3d 140 (5th Cir.200), 2000). Abstract Crimes against the public may have various manifestations. There are some acts that some members of the public get involved in which qualify to be crimes. Sometimes this happens without their knowledge as they bid to have their grievances addressed.
5 Pages(1250 words)Essay
Missouri Crimes Against Property
Even though, robbery includes taking money or property, it is categorized as a violent criminal activity. This is because robbery involves a threat of force or employment of force on a person that is present. Conversely, burglary is not classified as a violent crime because it involves an unoccupied residence or unoccupied structure.
5 Pages(1250 words)Essay
Cyber Crimes
According to studies, cyber crimes have the potential of harming a nation’s security system and its financial well-being if these criminal levels escalate. In many cases, these cyber crimes include copyright infringement, underage pornography, government cracking, and child grooming.
10 Pages(2500 words)Research Paper
Crimes Against Information Systems Analysis Essay
The applicability of the technology can be deemed appealing to exploitation by the delinquent users that can be pointed out to perceive the technology in criminal acts due to certain factors. One of the most attractive features of the computer and the internet technology is the power to access information.
7 Pages(1750 words)Essay
Crimes Against Information Systems Analysis Master Essay
Imagine doing this with the book version of the Encyclopedia, sifting through numerous pages looking out for the information alphabetically and still may not be able to retrieve it. Another advantage of Information System is the availability of real time information on any area.
8 Pages(2000 words)Essay
Crimes Against Humanity
In effect, no matter how our leaders may justify the causes of war, it is still a crime against humanity. Originally, the term “crimes against humanity” was closely connected with the customary law of armed conflict. However, from the time
4 Pages(1000 words)Essay
Crimes Against Humanity
In effect, no matter how our leaders may justify the causes of war, it is still a crime against humanity. Originally, the term “crimes against humanity” was closely connected with the customary law of armed conflict. However, from the time
4 Pages(1000 words)Essay
British American Tobacco Plc is one of the leading global tobacco companies. Based in the Globe House in London, the company is a constituent of the FTSE 100
12 Pages(3000 words)Essay
But the authorities deny that they torture, while high level officials are aware and supportive of the torturous practices. Torturing methods are pursued more desperately in
3 Pages(750 words)Essay
Let us find you another Essay on topic Crimes Against Information Systems Analysis for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us