Crimes Against Information Systems Analysis - Essay Example

Only on StudentShare

Extract of sample
Crimes Against Information Systems Analysis

Cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as "the use of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidating a government or civilian population." (p.8) Over the years, the level of cyber-terrorism has evolved. Years ago, hackers attained satisfaction by simply breaking into a system (Wilmot, 2004). However, Littleton (1995) still regards hackers as dangerous and further implies imminent danger by questioning the ability of a hacker to become a cyber-terrorist. Wilmot (2004) contends that hackers' abilities to "crack passwords or find a back door route through a security firewall" shows that hackers can easily use a simple act to corrupt data in high technology. (p. 287). Though hackers implement a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as modern day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information. However, the sophistication of cyber-terrorists' methods correlates with the degree of their motives.
An intent ...Show more

Summary

At one time, an individual with a gun could decimate several people and would be highly feared. Now a mischievous individual with access to informational systems is thought not only to be menacing but also lethal to integral parts of society. Criminals no longer opt to torment a few victims using firearms or explosives; rather, they chose to inflict terror on the mass by crippling or even crashing critical informational systems…
Author : malinda49
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Crimes Against Information Systems Analysis"
with a personal 20% discount.
Grab the best paper

Related Essays

Crimes against humanity and genocide
The Holocaust does not begin with the first shots fired in 1939, or a charismatic leader whose speeches entranced the nation; it begins with a boy named Adolph Hitler. Hitler was born on April 20, 1889 in Vienna Austria to Alois Hitler and his third wife, Klara.
12 pages (3000 words) Essay
Crimes Against Information Systems Analysis Essay
The applicability of the technology can be deemed appealing to exploitation by the delinquent users that can be pointed out to perceive the technology in criminal acts due to certain factors. One of the most attractive features of the computer and the internet technology is the power to access information.
7 pages (1750 words) Essay
Crimes Against Information Systems Analysis Master Essay
Imagine doing this with the book version of the Encyclopedia, sifting through numerous pages looking out for the information alphabetically and still may not be able to retrieve it. Another advantage of Information System is the availability of real time information on any area.
8 pages (2000 words) Essay
War Crimes and crimes against humanity
From 125,000 to 300,000 people were killed... We recognize our role in history is to bring the transgressors to justice." Ramsey Clark War crimes are torture, rape, slavery, political, racial abuse, religious persecutions, extermination, killings and indignities heaped on the vanquished by the victor during the war.
10 pages (2500 words) Essay
Strategic Analysis and Selection of Information Systems
(Drucker) Unfortunately, even today, operating plans and not business strategy, govern most investments in the IT space. Given the pivotal role that Information Technology plays in todays networked and e-commerce enabled global business, most companies think of their IT plans as integral to business strategy.
4 pages (1000 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT