Got a tricky question? Receive an answer from students like you! Try us!

Crimes Against Information Systems Analysis - Essay Example

Only on StudentShare
College
Essay
Miscellaneous
Pages 7 (1757 words)

Summary

At one time, an individual with a gun could decimate several people and would be highly feared. Now a mischievous individual with access to informational systems is thought not only to be menacing but also lethal to integral parts of society. Criminals no longer opt to torment a few victims using firearms or explosives; rather, they chose to inflict terror on the mass by crippling or even crashing critical informational systems…

Extract of sample
Crimes Against Information Systems Analysis


Cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population." (p.8) Over the years, the level of cyber-terrorism has evolved. Years ago, hackers attained satisfaction by simply breaking into a system (Wilmot, 2004). However, Littleton (1995) still regards hackers as dangerous and further implies imminent danger by questioning the ability of a hacker to become a cyber-terrorist. Wilmot (2004) contends that hackers' abilities to "crack passwords or find a back door route through a security firewall" shows that hackers can easily use a simple act to corrupt data in high technology. (p. 287). Though hackers implement a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as modern day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information. However, the sophistication of cyber-terrorists' methods correlates with the degree of their motives.
An intent ...
Download paper
Not exactly what you need?

Related Essays

Crimes against humanity and genocide
The Holocaust does not begin with the first shots fired in 1939, or a charismatic leader whose speeches entranced the nation; it begins with a boy named Adolph Hitler. Hitler was born on April 20, 1889 in Vienna Austria to Alois Hitler and his third wife, Klara. Hitler had a very difficult childhood, as his father was demanding and critical f his every move. He expected Hitler to follow his example and work for the Austrian government as he had. The young Hitler had bigger things in mind. He first wanted to become an artist, then an architect. He failed at both. Hitler soon found himself…
12 pages (3012 words)
Crimes Against Information Systems Analysis Essay
This can be considered as an effective form of enterprise due to the fact that information can be considered influential specifically retrieval and acquisition of confidential and classified information. Another is the application of the access to destroy or disrupt systems due to certain goals and even at certain price (Franda, 2001). These are only some of the scenario for which the potentials of the technology can be applied in unlawful acts. In doing so the most dominant affective factor for such actions is the use of the computer technology and the internet as a venture and scheme on the…
7 pages (1757 words)
Crimes Against Information Systems Analysis Master Essay
For example, users can login to their banks' website, credit card site, or share markets for any online transactions. No doubt, this provides convenience but it also comes with its own price of managing the security of the transactions. Crimes against Information systems is a growing concern amongst the Cyber security experts and Federal Law agencies as this has the potential to bring down a system and operation which otherwise would run smoothly.…
8 pages (2008 words)
War Crimes and crimes against humanity
Turkish officials killing Armenians during the war, Germans committing atrocities on Jews, Polish people and others, cases that came up during Nuremburg trials, Russian treatment of German prisoners all came under war crimes. Crimes against humanity include genocide, mass murder, en mass slavery, mass executions, enslavement, deportation, extermination etc. This means any atrocious act committed on a large group could be termed as crimes against humanity. Sometimes these two overlap one another. Paul Touvier, Klaus Barbie, and Maurice Papon in France, and Imre Finta in Canada are a few…
10 pages (2510 words)
Strategic Analysis and Selection of Information Systems
Dichotomies begin to occur when environmental changes do not occur as foreseen or at the rate expected by the strategy makers, as also when the outcomes of IT initiatives are measured independently of the fundamentals in strategy that led to their formulation in the first place. This essay takes up two cases from the May and October 2001 issues of CIO Magazine. It studies the dilemmas, even predicaments faced by pioneers who took far-reaching initiatives in their business and IT strategy and analyzes their success or lack thereof vis-vis their formulation, execution, and goal achievement.…
4 pages (1004 words)