Crimes Against Information Systems Analysis

College
Essay
Miscellaneous
Pages 7 (1757 words)
Download 0
At one time, an individual with a gun could decimate several people and would be highly feared. Now a mischievous individual with access to informational systems is thought not only to be menacing but also lethal to integral parts of society. Criminals no longer opt to torment a few victims using firearms or explosives; rather, they chose to inflict terror on the mass by crippling or even crashing critical informational systems…

Introduction


Cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population." (p.8) Over the years, the level of cyber-terrorism has evolved. Years ago, hackers attained satisfaction by simply breaking into a system (Wilmot, 2004). However, Littleton (1995) still regards hackers as dangerous and further implies imminent danger by questioning the ability of a hacker to become a cyber-terrorist. Wilmot (2004) contends that hackers' abilities to "crack passwords or find a back door route through a security firewall" shows that hackers can easily use a simple act to corrupt data in high technology. (p. 287). Though hackers implement a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as modern day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information. However, the sophistication of cyber-terrorists' methods correlates with the degree of their motives.
An intent ...
Download paper
Not exactly what you need?

Related papers

Crimes Against Humanity and Genocide
Hitler had a very difficult childhood, as his father was demanding and critical f his every move. He expected Hitler to follow his example and work for the Austrian government as he had. The young Hitler had bigger things in mind. He first wanted to become an artist, then an architect. He failed at both. Hitler soon found himself drifting and alone in Vienna. He could barely keep a regular job and…
Strategic Analysis and Selection of Information Systems Essay
For the purpose of this assignment, two articles will be reviewed for inclusion into the essay. The first is Collaborative Computing and True Enterprise Architecture is Still Two Years Away, by Worthen and the second is B2B: Execution of the Concept is Key to Success by M. Sawhney. The purpose of this assignment is to explain the relationship between business strategy in IT strategy, determine any…
Crimes Against Information Systems Analysis Essay
This can be considered as an effective form of enterprise due to the fact that information can be considered influential specifically retrieval and acquisition of confidential and classified information. Another is the application of the access to destroy or disrupt systems due to certain goals and even at certain price (Franda, 2001). These are only some of the scenario for which the potentials…
Crimes Against Information Systems Analysis Master Essay
For example, users can login to their banks' website, credit card site, or share markets for any online transactions. No doubt, this provides convenience but it also comes with its own price of managing the security of the transactions. Crimes against Information systems is a growing concern amongst the Cyber security experts and Federal Law agencies as this has the potential to bring down a…
War Crimes and crimes against humanity
Turkish officials killing Armenians during the war, Germans committing atrocities on Jews, Polish people and others, cases that came up during Nuremburg trials, Russian treatment of German prisoners all came under war crimes. Crimes against humanity include genocide, mass murder, en mass slavery, mass executions, enslavement, deportation, extermination etc. This means any atrocious act committed…
Strategic Analysis and Selection of Information Systems
Dichotomies begin to occur when environmental changes do not occur as foreseen or at the rate expected by the strategy makers, as also when the outcomes of IT initiatives are measured independently of the fundamentals in strategy that led to their formulation in the first place. This essay takes up two cases from the May and October 2001 issues of CIO Magazine. It studies the dilemmas, even…
Crimes Against Information Systems Analysis
Cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population." (p.8) Over the years, the level of cyber-terrorism has…