Skip to main content

Computer criminals

Computer Criminal


What kinds of people are perpetrating most of the information technology crime? Over 80% may be employees, and the rest are outside users, hackers and crackers, and professional criminals.

Employees: “employees are the ones with the skill, the knowledge, and the access to do bad things”, says Don Parker, an expert on computer security at for SRI international in Menlo Park, California. They‘re the ones, for example, who can most easily plant a ‘logic bomb’. Dishonest or disgruntled employees, he says, pose “a far greater problem than most people realize, the increasing use of laptops of the premises, away from the eyes of supervisors, concerns some security experts, they worry that dishonest employees or outsiders can more easily intercept communications or steal company trade secrets.
Worker may use information technology for personal profit or steal hard or information to sell. They may also use it to seek revenge for real or imagined wrongs, such as being passed over for promotion. Some times they may use the technology. Simply to demonstrate to themselves that they have power over people. This may have been the case with a Georgia printing company employee convicted of sabotaging the firm’s computer system. As files mysteriously disappeared and the system randomly crashed, other workers became so frustrated and enraged that they quit.

Outside users: suppliers and clients may also gain access to a company’s information technology and use it to commit crimes. With both, this becomes more a possibility as electronic connections become more common place.

Hackers and crackers: hackers are people who gain unauthorized access to computer or telecommunication systems for the challenge or even the principle of it. For example, Eric Corley, publisher of a magazine called 2600: the hackers quarterly, believes that hackers are merely engaging in “healthy exploration”. In fact, by they perform a favor and a public service, such unauthorized entries show the corporation’s the leaks in their security systems. Crackers also gain unauthorized access to information technology but do so for malicious purposes. Crackers attempt to break to break into computers and deliberately obtain information for financial gain, shut down hardware, pirate software, or destroy data. The tolerance for “benign explorers” hackers has waned. Most communications systems administrators view any kind of unauthorized access as a threat, and they pursue the offenders vigorously. Educators try to point out to students that universities can’t provide an education for everybody if hacking continues. The most flagrant cases of hacking are met with federal prosecution. A famous instance involved five young New York area men calling themselves the masters of Deception who had broken into numerous information systems.

Professional criminals: members of organized crime rings don’t just steal information technology. They also use it the way that legal businesses do – as a business tool, but for illegal purposes. For instance, databases can be used to keep track of illegal gambling debts and stolen goods. Drug dealers have used pagers as a link to customers. Microcomputers, scanners, and printers can be used to forge checks, immigration papers, passports, and driver’s licenses. Telecommunications can used to transfer funds illegally. As information technology crime has become more sophisticated so have the people charged with preventing it and disciplining its outlaws. Campus administrators are no longer being quite as easy on offenders and are turning them over to police. Industry organizations such as the Software Publishers Association are going after software pirates large and small. Police departments as far apart as Medford, Massachusetts, and San Hose, California, now have police patrolling a “cyber beat”. That is, they cruise online bulletin boards looking for pirated software, stolen trade secrets, child molesters, and child pornography.

Comments

Popular posts from this blog

Blog Commenting Search Query Tricks

 inurl: blog”guest house” comment query site:.com inurl:blog + “post a comment” + keyword site:.com inurl:blog + “post a comment” + commentluv enabled “Add comment” Your Keywords “Post comment” Your Keywords “Write comment” Your Keywords Your Keywords “leave a comment” / “leave a comment” Your Keywords “Notify me of follow-up comments?”+” Submit the word you see below:” Your Keywords “Remember my personal information” + “Notify me of follow-up comments?” Your Keywords “Notify me of follow-up comments” Your Keywords “This site uses KeywordLuv” Your Keywords “Enable CommentLuv” Your Keywords “You can use these tags” Your Keywords “Powered by BlogEngine.NET” Your Keywords “Allowed HTML tags:” Your Keywords “top commenter” “Keyword” “Powered By Blogger” “Keyword” “Powered By WordPress” “Keyword” “Powered By Typepad” “Keyword” “Powered By Drupal” “Keyword” “Powered By Blogengine”

Workscout wordpress theme nulled v1.5.07 | WorkScout - Job Board WordPress Theme

WorkScout - Job Board WordPress Theme Version: 1.5.07 WorkScout is an all-in-one WordPress solution for recruiters , employment agencies and any kind of job office you can think of. Powerful tool that allows building a professional website in minutes. No coding knowledge required. Download

Complete Ethical Hacking Bootcamp 2021: Zero to Mastery Free Download

Complete Ethical Hacking Bootcamp 2021: Zero to Mastery Free Download   Learn Ethical Hacking + Penetration Testing! Use real techniques by black hat hackers then learn to defend against them!    What you'll learn   Learn Ethical Hacking from scratch & All 5 phases of Penetration Testing  Learn Python from scratch so you are able to write your own tools for ethical hacking  Setting up your Hacking Lab: Kali Linux and Virtual Machines (Works with Windows/Mac/Linux)  Create additional virtual *vulnerable* machines that we can practice our attacks on  Create trojans, viruses, keyloggers for ethical hacking  Learn how to bypass Firewalls & Intrusion Detection System with Advanced Scanning  Learn how to crack Wireless Access Point passwords  Bug Bounty: Discover all types of Web Application Bugs that could cause a threat  Learn how to gain access to any type of machine: Windows/Linux/MacOS  Sniff passwords over the local area network with Man In The Middle Attacks  SQL Injecti