StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Computer Virus Charges Sought - Assignment Example

Cite this document
Summary
In the paper “Computer Virus Charges Sought” the author describes the case of the creator of the “I LOVE YOU VIRUS”. Onel de Guzman was a Pilipino hacker operating in the late 1990s.  He acted alone by most accounts, but some say that he was assisted by a friend…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.2% of users find it useful
Computer Virus Charges Sought
Read Text Preview

Extract of sample "Computer Virus Charges Sought"

1. The creator of the “I LOVE YOU VIRUS,” Onel de Guzman, was a Pilipino hacker operating in the late 1990s. He acted alone by most accounts, but some say that he was assisted by a friend named Reomel Lamores (Isabel, Landler).2. According to Guzman, he programmed the virus merely to practice his programming skills. He says that programming viruses is one of the greatest challenges a programmer can face. He contends that he did not intend for the virus to spread, a contention held up in court.

He also programmed several other viruses during his studies and even proposed one as his thesis project, giving some credence to the fact that he did not intend to spread this particular virus (Guzman). 3. The I Love You Virus, as one of the first major viruses since the internet exploded in the late 90s and early 2000s, shook people’s faith in the internet as a secure place. It also taught users that they had to be very careful of attacks that take advantage of their emotional state (by encouraging them to click/download something in order to cause a virus on their computer), such as the “I love you” message or other questionable content.4. Guzman did not face any direct punishment for his crimes.

Though Pilipino authorities tried to charge with a variety of crimes from theft to criminal mischief, none of the charges landed because of lack of evidence and the fact that the Pilipino criminal justice system was simply not set up to deal with cyber attacks. His name, however, will forever be associated with this virus and he will have a hard time finding employment in the future (Landler). I think that this punishment might fit the crime – it’s impossible for someone to make reparations for billions of dollars worth of damages, and people need to take some responsibility for their own internet behavior.

If Guzman didn’t do this, someone else would have."CNN - Transcript: Onel De Guzman - September 26, 2000." CNN.com - Breaking News, U.S., World, Weather, Entertainment & Video News. Web. 25 Sept. 2011. .Landler, Mark. "A Filipino Linked to Love Bug Talks About His License to Hack - New York Times." The New York Times - Breaking News, World News & Multimedia. Web. 25 Sept. 2011. .Kershner, Isabel, and Mark Landler. "TECHNOLOGY; Computer Virus Charges Sought - New York Times." The New York Times - Breaking News, World News & Multimedia. Web. 25 Sept. 2011. .

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Virus Charges Sought Assignment Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1580622-case-study-5-the-i-love-you-virus
(Computer Virus Charges Sought Assignment Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1580622-case-study-5-the-i-love-you-virus.
“Computer Virus Charges Sought Assignment Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1580622-case-study-5-the-i-love-you-virus.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Virus Charges Sought

The Technology Used in Cybercrimes

This paper “The Technology Used in Cybercrimes” seeks to give an in-depth analysis of the Stuxnet computer virus, which attacked the Iranian uranium plant.... This paper seeks to give an in-depth analysis of the Stuxnet computer virus, which attacked the Iranian uranium plant.... The virus was observed to have been made and programmed to run on Microsoft Windows.... hellip; The author states that despite the worm being observed in Indonesia, India, Azerbaijan, the United States, and Pakistan, the virus was observed to have targeted five Iranian organizations....
3 Pages (750 words) Research Proposal

Ethics in Cyberspace

In addition, release of computer virus is more acceptable because the situation can be reversed unlike the release of confidential information.... The act of customer Data protection requires one to process the information in a confidential manner and breaking the act will result one to facing criminal charges.... The main thesis of this essay, given by the researcher: putting harmless virus in the internet for the purposes of seeing how fast the virus will spread is more acceptable than selling a customer's information to a competing company....
4 Pages (1000 words) Essay

Quality Driven Strategies and Technologies

In 1985, the company originated in the name of Quantum computer Service that provided an online link to Commodore Computers.... Soon Quantum computer Service created the PC Link for IBM systems.... Quantum computer Service was then quick to realize the impending potential of online services and effected a series of mergers and time-ups....
6 Pages (1500 words) Essay

The history of computer crimes

Since the dawn of the computer and technological age, computer crimes have evolved just as intricately and as surely as the advancements and upgrades in computer technology.... hellip; This paper shall trace the evolution of computer crimes, from the simpler age of computer technology to the present age of globalization and modernization. From the 1960s to the 1970s, most computer crimes In 1969, a student riot in Canadian school building resulted to damages totaling around $2 million....
5 Pages (1250 words) Term Paper

Recent Malware Attack and Stuxnex Virus

Stuxnet is a very complex computer virus, which was observed to be specifically designed for industrial appliances attack.... This case study "Recent Malware Attack and Stuxnex virus" describes features of Stuxnet virus, the way of malware originated, propagated, statistical evidence on the prevalence of the malware, aspects of those malware attacks.... This is evident in the case of the Stuxnet virus, which was used to attack the Iranian nuclear power plant (Rosenzweig, 2013)....
7 Pages (1750 words) Case Study

Publishing a Magazine on How Secure Your Computer

The second thing to ensuring that your computer is safe is employing the use of an anti-virus.... The anti-virus will according to Kaspersky lab, ensure that your computer is safe from viruses, worms, malicious codes and any suspicious software that are likely to affect the normal functioning of your computer (Caldwell, 2003).... The anti-virus is capable of removing the malicious software from your computer.... Not only should you ensure that you have an anti-virus, but also ensure that the anti-virus you choose to incorporate in your system in compatible with the computer programs installed....
9 Pages (2250 words) Essay

Computer Crimes Categories

The virus has had devastating impacts on the information stored in the computers, causing unexpected disruptions in the flow of activities.... The paper "computer Crimes Categories" states that while shopping online, it is of paramount importance to be extra cautious of the authenticity of the sites prior to making any payments.... Primarily, cybercrime does utilize the computer to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft....
6 Pages (1500 words) Essay

Keeping Computer Systems Clean: Antivirus Software Industry

om was hacked, and this is not the only website which has been brought to its knees by virus-spreading malware.... Visitors to the site were exposed to the virus as well, causing problems not only for the website but also its users.... The paper describes the precautions that would either prevent or fix a lot of troubles yet ordinary computer users do not do these simple things on a regular basis.... Just as diet and exercise take some effort and concentration, keeping computer systems clean takes the latest scanning software....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us