Argument of Computer Crime

Topics: Computer, Malware, Computer security Pages: 4 (1218 words) Published: July 19, 2013
Argumentative Essay -DISCURSIVE ESSAY


When people hear the word computer crime, they often think of some bad pictures from the Internet that show crimes involving computers. Those tapes of crime are no different from crimes without computers. The computer is only a tool that a criminal uses to commit a crime. There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, because many of these computer crimes are apparently not detected by the victims. Many of these crimes are never reported to authorities, partly because the losses are often difficult to calculate. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals are increasing rapidly. Estimates are that computer crime costs victims at least five billion dollars each year in the USA, and the true value of such crimes might be substantially higher.

In computer security, there is a new word: "information warfare." While "information warfare" is just another name for computer crime, the word "warfare" does fairly indicate the amount of damage inflicted on society. There are three major classes of criminal activity with computers: unauthorized use of a computer, releasing a malicious computer program (called a “virus”) and harassment on the Internet. These are in contrast to merely using computer equipment as a tool to commit old crimes.

Unauthorized use of computers generally takes the following forms: Unauthorized viewing of computer files, changing data, deleting data, and denying service to authorized users. Most unauthorized use is accomplished by a person who uses a modem to access a remote computer from his house. In this way, the computer criminal is acting analogously to a thief. To successfully use a remote computer, any user must have both a...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Crime Essay
  • computer crimes Essay
  • Computer Crime Essay
  • Computer Crimes Essay
  • Computer Crimes Essay
  • Computer Crime Essay
  • cyber crime Essay
  • Computer Crime Essay

Become a StudyMode Member

Sign Up - It's Free