Crime and Cyber Terrorism

Submitted by: Submitted by

Views: 323

Words: 3578

Pages: 15

Category: Business and Industry

Date Submitted: 12/13/2012 05:19 AM

Report This Essay

Crime and Cyber Terrorism

Computer Security and Legal Issues

Abstract 

Information technology (IT) is evolving every day and our day-to-day life is becoming more and more dependent on it. In this twenty first century, we cannot imagine ourselves without emails, online banking systems and health care systems and without World Wide Web. In other words, evolution of IT has given a modern, technologically advanced and convenient life to the society. But, over the time we are also observing explosive growth in the darker side of the IT - regarding hacking and cyber-crimes. Activities like unauthorized computer intrusion, denial of service (DOS), stealing computer passwords and secure data; causing damage to computer systems and databases and causing damage to individuals/society are not very rare these days.

As we go further on this paper, we will see different aspects of hacking, from harmless (simply looking around thru web) to dangerously harmful (cyber-terrorism). Irrespective of harmless or harmful, we need to understand is it ethical and how does it impact the global world. This paper is intended to discuss the ethical issues and moral values involved with this darker side of information technology. This paper also includes discussion on the good side of hacking and how hacking can lead to serious cyber-crimes and causes harm to the world community.

According to Wikipedia a computer hacker can have two definitions:

* In programming, a computing enthusiast, the term is normally applied to people who take a delight in experimenting with system hardware (the electronics), software (computer programs) and communication systems (telephone lines, computer networks etc). (2012)

* In data (information) security, an unauthorized user who tries to gain entry into a computer, or computer network, by defeating the computers access (and/or security) controls. (2012)

Wikipedia...