1,554
16
Essay, 2 pages (450 words)

Computer crime 3 15239

Ever since I got my first computer. I have enjoyed working on them. I have learned a tremendous amount of trouble shooting. With my recent computer I have come across computer crime. I got interested in hacking, prhreaking, and salami slicing. But before I go to far, I need to learn more about it like the consequences? One question in mind is what crimes are their and what kind of things you can do with them? I would like to find out why people do thesis things? I would also like to learn the laws against all computer crime?

II

Today’s computer society has brought a new form of crime. There are those ” hackers” who break their way into computers to learn the system or get information. I found out in the book Computer Crime written by Judson, Karen: That ” Salami Slicers” steal small amounts of money from many bank customers this adding up to a great deal of money. I also read about phone phreaks more known as ” Phreakers.” They steal long distance phone services. Phreakers commit many other crimes against phone companies.

In the book Computer Crime it states, most people commit thesis crimes, because they where carious and wanted to explore the system. All they want to do is exploit systems not destroy it. It is purely intellectual. I know one reason is that is can be very rewarding. Hackers are drawn to computers for the aninymity they allow. They feel powerful and can do anything. Hackers can be there own person out side the real world.

I found out Arizona was the first state to pass a law against computer crime, in 1979. In 1980 the U. S. copyright act was amended to include soft ware. I found out that in 1986 a

computer farad abuse act was passed. This act was made to cover over any crime or computer scheme that was missed with any former laws. Violations to any of thesis laws are a maxim of five years in prison and a $250, 000 fine.

III

With my computer I can do lots of thesis things but choose not to. Because I know that if you know computers you can do much more like carious wise. If you know computers you set for the future. I’m not saying I don’t have fun with my computer I like causing a little trouble every now and then. Well I piety much covered the motives and intentions behind the most common computer crimes. I explained the laws and punishments for committing thesis crimes. I hope I cleared things up for you elutriate computer people, and gave you a more understanding of the things that can be done. As you have red you can see that computers can and are more dangerous than guns.

Thank's for Your Vote!
Computer crime 3 15239. Page 1
Computer crime 3 15239. Page 2
Computer crime 3 15239. Page 3

This work, titled "Computer crime 3 15239" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Computer crime 3 15239'. 14 September.

Reference

AssignBuster. (2022, September 14). Computer crime 3 15239. Retrieved from https://assignbuster.com/computer-crime-3-15239/

References

AssignBuster. 2022. "Computer crime 3 15239." September 14, 2022. https://assignbuster.com/computer-crime-3-15239/.

1. AssignBuster. "Computer crime 3 15239." September 14, 2022. https://assignbuster.com/computer-crime-3-15239/.


Bibliography


AssignBuster. "Computer crime 3 15239." September 14, 2022. https://assignbuster.com/computer-crime-3-15239/.

Work Cited

"Computer crime 3 15239." AssignBuster, 14 Sept. 2022, assignbuster.com/computer-crime-3-15239/.

Get in Touch

Please, let us know if you have any ideas on improving Computer crime 3 15239, or our service. We will be happy to hear what you think: [email protected]