Реферат по предмету "На английском языке"


Computer Crime Essay Research Paper Computer CrimeIt

Computer Crime Essay, Research Paper
Computer Crime
It’s the weekend, you have nothing to do so you decide to play around
on your computer. You turn it on and then start up, you start calling
people with your modem, connecting to another world, with people just like
you at a button press away. This is all fine but what happens when you
start getting into other peoples computer files. Then it becomes a crime,
but what is a computer crime really, obviously it involves the use of a
computer but what are these crimes. Well they are: Hacking, Phreaking, &
Software Piracy.
To begin I will start with Hacking, what is hacking. Hacking is
basically using your computer to “Hack” your way into another. They use
programs called scanners which randomly dials numbers any generating tones
or carriers are recorded. These numbers are looked at by hackers and then
used again, when the hacker calls up the number and gets on he’s presented
with a logon prompt, this is where the hacking really begins, the hacker
tries to bypass this anyway he knows how to and tries to gain access to the
system. Why do they do it, well lets go to a book and see “Avid young
computer hackers in their preteens and teens are frequently involved in
computer crimes that take the form of trespassing, invasion of privacy, or
vandalism. Quite often they are mearly out for a fun and games evening, and
they get entangled in the illegal use of their machines without realizing
the full import of what they are doing”, I have a hard time believing that
so lets see what a “hacker” has to say about what he does “Just as they
were enthraled with their pursuit of information, so are we. The thrill of
the hack is not in breaking the law, it’s in the pursuit and capture of
knowledge.”, as you can see the “hacker” doesn’t go out to do destroy
things although some do. It’s in the pursuit of knowledge. Of course this
is still against the law. But where did all of this start, MIT is where
hacking started the people there would learn and explore computer systems
all around the world. In the views of professional hacking is like drugs or
any other addictive substance, it’s an addiction for the mind and once
started it’s difficult to stop. This could be true, as hackers know what
they are doing is wrong and they know odds are they will be caught. But as
I mentioned some hackers are just above average criminals, using there
skills to break in banks and other places where they can get money, or
where they can destroy information. What a hacker does at a bank is take a
few cents or even a few fractions of a cents from many different accounts
this may seem like nothing but when all compiled can be alot. A stick up
robber averages about $8,000 each “job”, and he has to put his life and
personal freedom on the line to do it while the computer hacker in the
comfort of his own living room averages $500,000 a “job”. As for people
destroying information, this is for taking some one down, destruction of
data could end a business which for some is very attractive. It can cost a
company thousands of dollars to restore the damage done.
Now that you have an understanding of what a “hacker” is, it time to
move on to someone closely associates with a hacker. This is a Phreak, but
what is that. For the answer we turn to the what is known as the
“Official” Phreakers Manual “Phreak [fr'eek] 1. The action of using
mischievous and mostly illegal ways in order to not pay for some sort of
telecommunications bill, order, transfer, or other service. It often
involves usage of highly illegal boxes and machines in order to defeat the
security that is set up to avoid this sort of happening. [fr'eaking] v. 2.
A person who uses the above methods of destruction and chaos in order to
make a better life for all. A true phreaker will not go against his fellows
or narc on people who have ragged on him or do anything termed to be
dishonourable to phreaks. [fr'eek] n. 3. A certain code or dialup useful in
the action of being a phreak. (Example: “I hacked a new metro phreak last
night.”)” The latter 2 ideas of what a phreak is, is rather weird. A
Phreak like the hacker likes to explore and experiment, however his choice
of exploring is not other computer but the phone system as a whole. Phreaks
explore the phone system finding many different ways to do things, most
often make free calls. Why do they do this, ” A hacker and phreaker will
have need to use telephone systems much more than an average individual,
therefore, methods which can be used to avoid toll charges are in order. “.
A phreak has two basic ways of making free calls, he can call up codes or
PBXs on his phone and then enter a code and make his call or he can use
Electronic Toll Fraud Devices. Codes are rather easy to get the phreak
will scan for them, but unlike a hacker will only save the tone(s) number
instead of the carrier(s). Then he will attempt to hack the code to use it,
these codes range from numbers 0 – 9 and can be any length, although most
are not more than 10. Electronic Toll Fraud Devices are known as Boxes in
the underground. Most are the size of a pack of smokes, or than can be
smaller or bigger. I will not go too deep. They are electronic devices
than do various things, such as make outgoing calls free, make incoming
calls free, simulate coins dropping in a phone, etc. People who “Phreak”
are caught alot these days thanks to the new technology.
Software Piracy is the most common computer crime, it is the illegal
coping of software. “People wouldn’t think of shoplifting software from a
retail store, but don’t think twice about going home and making several
illegal copies of the same software.” and this is true because I myself am
guilty of this. The major problem is not people going out and buying the
software then making copies for everyone, it’s the Bulletin Boards that
cater to pirating software, that really cause the problem. On anyone one
of these boards one can find an upwards of 300 – 1000+ of pirated software
open for anyone to take. This is a problem and nothing can really be done
about it. Few arrests are made in this area of computer crime.
I will now devote a brief section to the above mentioned BBS’, most
are legal and do nothing wrong. However there are many more that do accept
pirated software, pornographic pictures, animations, and texts. As well as
a trading area for phone codes, other BBS’, Credit Card numbers, etc. This
is where a majority of Hackers and Phreaks come, as well as those who
continue to pirate software come to meet and share stories. In this is a
new world, where you can do anything, there are groups that get, crack, and
courier software all over the world some of them are called: INC:
International Network Of Crackers, THG: The Humble Guys, TDT: The Dream
Team. As well a number of other groups have followed suit such as
Phalcon/SKISM (Smart Kids Into Sick Methods), NuKE, and YAM (Youngsters
Against McAfee) these are virus groups who write and courier their work
anywhere they can, they just send it somewhere, where anyone can take it
and use it in any manner they wish, such as getting even with someone. All
of these activities are illegal but nothing can be done, the people running
these boards know what they are doing. As it stands right now, the BBS
world is in two parts Pirating and the Underground, which consists of
Hackers/Phreaks/Anarchists/Carders(Credit Card Fraud)/Virus programmers.
All have different boards and offer a variety of information on virtually
any subject.
Well from all of this reading you just did you should have a fairly
good idea of what computer crime is. I didn’t mention it in the sections
but the police, phone companies are arresting and stopping alot of things
every day. With the new technology today it is easier to catch these
criminals then it was before. With the exception of the BBS’ the police
have made some major blows busting a few BBS’, arresting hackers and
phreaks. All of which were very looked up to for knowledge in their areas
of specialty. If I had more time I could go into these arrests but I must
finish by saying that these are real crimes and the sentences are getting
harsher, with alot of the older people getting out the newer people are
getting arrested and being made examples of. This will deter alot of
would-be computer criminal away.
S


Не сдавайте скачаную работу преподавателю!
Данный реферат Вы можете использовать для подготовки курсовых проектов.

Поделись с друзьями, за репост + 100 мильонов к студенческой карме :

Пишем реферат самостоятельно:
! Как писать рефераты
Практические рекомендации по написанию студенческих рефератов.
! План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом.
! Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач.
! Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты.
! Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ.

Читайте также:
Виды рефератов Какими бывают рефераты по своему назначению и структуре.

Сейчас смотрят :

Реферат Лікувальна фізкультура при операціях на органах грудної і черевної порожнини
Реферат Обоснование рациональной производственной структуры предприятия
Реферат Sonnet 73 Essay Research Paper Poetry is
Реферат Реінжиніринг на сучасному етапі розвитку
Реферат Тяговые расчёты пути локомотива
Реферат Технология производства свинины 2
Реферат Ранні форми релігії Давні вірування проукраїнців
Реферат Macbeth Literary Analysis Essay Research Paper In
Реферат Ошибки при делении понятий
Реферат The Death Penalty 10 Essay Research Paper
Реферат Методика изучения темы "Социально-экономическое положение Ингушетии XVII - первой половины XVIII вв."
Реферат Ответы на часто задаваемые вопросы по ПИФам
Реферат Основні види ризику в операціях із використанням іноземної валюти
Реферат Новый показатель оценки риска инвестиций
Реферат Апостол Сибири святитель Иннокентий (Вениаминов) и писатель И.А. Гончаров