Computer Crimes With Emphasis on Child Pornography Term Paper

Total Length: 1221 words ( 4 double-spaced pages)

Total Sources: -10

Page 1 of 4

Computer Crime

As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals.

Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals and schools to corporate businesses and government agencies. In this day and age, it seems as though no one is safe from computer crime.

This paper aims to identify the different types of computer crimes and what can be done to prevent them. In addition, it will analyze the issue of child pornography, revealing whether or not pornographic images created on a computer are illegal.

Types of Computer Crime

In this modern information age, the innovation and power of technology tests the ethics of the average person, not just the criminal. As a result, computer crime is on the rise.

The most common computer crime committed on a daily basis is software piracy (Lilley, 2003). Many people commit this crime without even realizing it. When computer software is purchased, users agree that it will used on a single computer and cannot be shared with others. However, many people lend software to their friends or install it on entire networks. This is a crime.

Today, computer crime includes a variety of things, ranging from malicious code, such as viruses and worms, to human threats, such as hackers. These attacks target different area of a system.

Malicious code, such as viruses and worms, attack a system either internally or externally (Loundry, 2003). Traditionally, the virus has been an internal threat, such as one within a company, while the worm has been a threat from an external source, such as an attack from outside through a modem or connecting network.
Individuals or groups of individuals that attempt to penetrate systems through computer networks, public switched telephone networks or other sources create human threats.

These attacks usually target known security vulnerabilities of computer systems. Hackers are the most widely known human threat (Cornwall, 1986). They are people who enjoy the challenge of breaking into systems and wreaking havoc.

Computer Crimes in the Corporate World

When 21-year-old Adrian Lamo broke into the internal networks of the New York Times earlier this year, he gained access to highly confidential information, including subscriber information and the social security numbers and home addresses of famous authors, such as Rush Limbaugh and Jimmy Carter (Lilley, 2003).

Fortunately, Lamo, who is well-known for exposing major security flaws of companies such as WorldCom and Yahoo, did not hack the system for personal gain. He was simply trying to prove that it could be done.

Computer crime has recently hit corporate world full blast, invading large, medium and small businesses by downloading confidential files; stealing their passwords, patents and database information; sending out false emails; transferring funds; and wreaking havoc on networks, servers and web sites (Westin, 2000).

Researchers say that most large businesses and government agencies in the United States have been the victim of computer crime, which has cost them millions of dollars.

According to Peter Lilley, author of "Hacked, Attacked and Abused: Digital Crime Exposed," the business world is completely dependent on technology but many users are ignorant of the risks involved with it (p. 124). These risks include organized digital crime, cyber laundering, hacking, cracking, worms, denial of service attacks, viruses, web site defacement, unauthorized disclosure of confidential information, and many more. Countless companies have suffered severe reputation, legal and financial consequences due to computer crimes.

Security flaws on three things: lack of money, lack of.....

Need Help Writing Your Essay?