Computer Science Info-Age & Ethics

Authors Avatar

Words: 1181        

Computer Science Info-Age & Ethics

                New times bring new crimes. It's a story as old as humanity and as new as the Internet. First come cars, and then car thieves. Telephones are followed by telephone fraud.

Now we've got computers . . ..

To make home, school, and office life easier, society relies on computers. As a result of this dependency, computer use grows everyday. Along with the growing use of computers comes widespread computer crime. With the Internet becoming increasingly popular, more and more people are becoming computer literate, and networks are becoming more readily accessible. The rise in computer crime can easily be blamed upon the increasing number of users. The Internet is widely deemed as a new community. Either way you look at it, the Internet offers cover for con artists and plenty of places where larceny can lurk.  The most common crimes committed via technology media are the same basic variations of the four main time-tested, real-world crimes:

  1. Forgery (of E-mail)
  2. Assault (on your Web site, E-mail box, or computer system)
  3. Fraud (cyber scams) and
  4. Robbery (theft of valuable information)

Various types of people commit computer crimes. The two most familiar being hackers and crackers. A hacker is a person who enjoys exploring the details of a programmable system and how to stretch their capabilities. A cracker is one who breaks security on a system. Although hackers and crackers both break into computer systems, their motives are different. Hackers seem to break into computer systems for the intellectual challenge. Crackers are considered malicious with the intention of harming or causing damage to a computer system. The motivations behind crackers' actions are profit, revenge or a mixture of the two.         

Join now!

There are six common types of characterised computer attacks by my knowledge:

  • Military/Intelligence Attacks
  • Business Attacks
  • Financial Attacks
  • Terrorist Attacks
  • Grudge Attacks
  • Reasonless Attacks

How are computer crimes committed? Break-in methods include altering input, theft of computer time, software theft, data theft/modification and output theft. Software theft is a large problem in the software industry. Not only does software theft contribute to loss of sales, but it also adds to the spread of computer viruses. Two examples of software theft are the production of illegal copies of software and the creation of software used ...

This is a preview of the whole essay

Here's what a star student thought of this essay

The report states the term 'hacker', however the term is part in-correct and correct. The part were it states 'enjoy' may be in-correct, as some people may hack for a financial benefit, but may not enjoy the work due to it's unethical. I believe that the student is a little confused over what an 'hacker' and an 'cracker' are, and this should be corrected within the report.

The report states six common types of computer attacks. The student could describe a little regrading each bullet point. The report could include 'A hacker may want to hack into a business, to acquire their supplier's list, which may be beneficial to other business or person'. By explaining in-depth regrading these points, this would show the examiner that the student understands the reason to why a hacker may target the six given examples. The student has stated how patents could be acquired by a number of companies/people, although didn't state what this means for the victim. As this could bankrupt a company, by costing the company too much in legal fees, and could cause a number of employee's to be unemployed due to this effect.

In summary the report is quite good. The student clearly shows that there have a detailed understanding of how computers can be accessed by hackers and similar people. However some of their bullet-points could be explained, which would give them high marks. The report's opening paragraph is quite good, and describes how the use of computers causes an upward trend in crime. However the student has listed four different crimes that certain people are undertaking. The bullet point 4, is in-correct, as this states 'theft of valuable information'. The report should re-place the word to 'data', as data is valuable and this may include credit/debit card details, consumer's delivery address, etc.