Create a new account

It's simple, and free.

Cyber Crime Fears of being

ng computers as subjects of a crime include the use of viruses, Trojan horses, logic bombs, and sniffers - all software creations that have the ability to seriously disrupt and potentially destroy the integrity, security, and even the existence of computer hardware and software. Additionally, a computer may be an instrument used to commit traditional crimes in a complex manner. A computer might be used to collect credit card information from consumers in order to make fraudulent purchases, to divert funds from on e bank account to another, or to commit fraud by collecting funds for goods or services that are never delivered (Hatcher, McDannel, & Ostfeld, 1999).

One of the most blatant forms of cyber crime occurs in the form of a tax on e-businesses. Nelson and Bacheldor (2000) reported that the risks of doing business on the Internet have come into sharp focus due to attacks that have shut down or restricted access to popular consumer sites. Companies such as Amazon.com, eBay.com, E-trade, and Buy.com have all been victimized by these attacks. Attacks called denial-of-service have been originated by malicious hackers or groups of hackers who surreptitiously gain access to hundreds of computers connected to the Internet and plant software code in those systems. Once a signal is sent, these computers start sending signals to the targeted Web site. The resulting traffic overload clogs access links, Internet routers, and Web site servers. Access time is either slowed or shut down entirely.

Nelson and Bacheldor (2000) also have pointed out that e-commerce industry participants are quickly moving to develop programs that will protect computers from becoming the unwitting hosts used to launch such assaults and also to creat

...

< Prev Page 2 of 7 Next >

More on Cyber Crime Fears of being...

Loading...
APA     MLA     Chicago
Cyber Crime Fears of being. (1969, December 31). In LotsofEssays.com. Retrieved 00:40, May 06, 2024, from https://www.lotsofessays.com/viewpaper/1700703.html