.

Sunday, April 14, 2019

Logic bombs Essay Example for Free

Logic bombs EssayWith the advent of study communication technology which has greatly helped in solving uncountable problems in all domains of military personnel life all oer the world, it has also come with its problems. Globally, the destination cyber villainy has gained unimaginable touristedity because of its harm to all segments of human life. Cyber crime has not been defined in statutes/acts of fan tan in many countries apart from a few developed countries which have some sections in their constitutions addressing this word form of emerging crime. The idea of cyber crime is not absolutely different from the other types of normal crimes. A crime is defined in the laws of land as the conduct which results to violation of the law and it is counterbalanced by the support of the state. The conduct may be an act or omission. Crime has been in existence by means of extinct human history and it is an economic and social phenomenon. It is a concept in the legal field which has the warrantee of the law . Crime hobo also be referred to as an offence.It is an act which is legally wrong and can be pursued by criminal proceedings which can result to penalty (http//www. cybercrimelaw. net/ pith/cybercrime. html). Cyber crime basically refers to any criminal activity that involves the use of figurer as a cock or a target. at that place atomic number 18 many kinds of unlawful activities that can be done via data processor and they include email spoofing, cyber deformation, sale of illegal articles, forgery, cyber stalking, online gambling, and intellectual property thi ever soy.The criminal solecisms where the computer is used as a target include access to computer, computer transcription, or computer networks without permission , stealing of discipline in electronic form, logic bombs, Trojan attacks, internet time theft, email bombing, salami attacks, stealing computer system, meshing jacking, personal destruction of the computer and data diddlin g (http//cybercrime. planetindia. net/intro. htm). Cyber crime is as result of various conditions and they atomic number 18 as follows Firstly, it is due to ability of the computer to retention data in a very slim space.Computers be designed in a very unique way such that they can store a lot of information in a very small space within it. This makes it comparablely to retrieve the information with a lot of ease. This is done using either virtual or physical medium. Secondly, it is very easy to access the information. This is usually due to the fact that the technology employed in defend a computer from unauthorized access is very complex and is prone to human errors. This poses the main challenge in the protection of a computer.The security systems can be penetrated through using different technologies like the use of key loggers implanted logic bombs, retina imagers and sophisticated voice recorders which usually dupe and trick the biometric system and cross the firewalls thus entering into the security system being used in the computer. The tierce reason is that the working of a computer is very complex and involves the use of an operating system that uses millions and millions of codes to store information and execute commands.Since all these is designed by humans whose mind is liable to shop lapses, the cyber criminals uses this one as an opportunity to distort the codes and gain access to the computer operating system. The fourth reason is because of heedlessness. It is evident that human behavior is often characterized by negligence. As a result of this, it is likely that while installing guarding programs, this negligence might occur thus giving the cyber criminals an opportunity for accessing the computer operation system (http//www.cybercrimelaw. net/ capacitance/cybercrime. html). From the previous experiences, it is notable that cyber crimes are done by various assorts of stack in the community. Some of this groups are justified depen ding on the intention of what they are doing in the cyber. These groups include children and adolescents at the age of 6-18 years. This group is normally active and inquisitive and therefore tend to be very curious to explore and know beyond what they are not aware of in life. This makes them to engage in these types of crimes.In addition, this group likes being popular and achieving unique things something which predisposes them to this kind of delinquency. The second category consists of organized hackers who form groups with a defined goal which may be settling political scores or to gaining competitive edge in the business world. The third and the last group consist of professional hackers/crackers. This are cyber criminals who are out to make money by using their expertise to damage other peoples information systems.They are often hire to crack the sites of competitors or rivals and access vital information related to their brassal, production, marketing and operational strat egies. The fourth group in some instances is composed of dissatisfied employees. In this case, the employees may have been sacked or demoted or denied a higher position or may be underpaid and they use cyber rimes as away of revenging (http//www. crime-research. org/analytics/702/).There are various forms of unlawful activities that are done via the computers and they include unauthorized access to computer systems or net works which is popularly known as hacking. This involves the use of sophisticated technology to penetrate to the computer systems. Theft of information from electronic devices or in electronics is another form of cyber crime. These electronic gadgets include elusive disks and removable computer devices. This form of crime is done by interfering with the data in the devices through virtual medium.Email bombing is also another common crime. It involves sending of emails to an individual or organization in bulk such that they derail the functioning or crashing of the computer system. Data diddling is also a form of cyber crime and is conducted before the raw data is processed by the computer. Here, the data is variegateed forward to being processed and then this is followed by ever-changing it back after the processing. Closely related to this are the salami attacks.These are cyber crimes that are common in financial organizations and they are done with an aim of committing financial crime. It involves the mutation of the computer systems slightly such that the damages go unnoticed. Denial of service which is overstretching of victims computer system with a lot of work than it can handle is also a cyber crime that has been identified. This overstretching of computer leads to its crash.The frequent disturb viruses and worms are forms of cyber crimes. The difference between the two is that while viruses need a file to attach to, alter and delete. The worms do not need this and they just use all the available space in the memory of the compute r. The other forms include the unauthorized soft wares known as Trojans, logic bombs, and internet time theft which involves stealing of another persons time for browsing which is done by getting the password and login ID.Lastly, is the web commandeer which is involves use of technology to access and gain control of another persons website and mutilating or changing the information in it. This cyber crime is usually done to people who are looking for money or want to politically destroy their rivals (http//www. usdoj. gov/criminal/cybercrime/). As it is widely known, prevention is better than cure and the selfsame(prenominal) case applies in cyber crimes . The fundamental preventive measure uses the 5P strategy to control and prevent this crime.The 5P stands for prevention, preservation, precaution, protection and perseverance. In addition, one should put the following in mind so as to prevent cyber crime. Firstly, avoid unveil personal information at the cyber, do not sent photo graphs online and stop chatting to unfamiliar people over the net. Elsewhere, web servers for the public must be separated from the internal corporate network. Always update your antivirus and clutches back ups of your information in the computer in other devices, use of firewalls.Additionally, do not ever send your credit card number to any site that is insecure and the use intrusion catching gadget may also help significantly. In conclusion therefore, since humans are rationally thinking, there is no way in which cyber crimes can be completely eliminated from the cyber space. What is most important in this case is to develop very stringent laws to protect the people from the effects of cyber crime and also sensitizing the people to observe morals while embracing the world of information communication technology

No comments:

Post a Comment