Студопедия

КАТЕГОРИИ:

АстрономияБиологияГеографияДругие языкиДругоеИнформатикаИсторияКультураЛитератураЛогикаМатематикаМедицинаМеханикаОбразованиеОхрана трудаПедагогикаПолитикаПравоПсихологияРиторикаСоциологияСпортСтроительствоТехнологияФизикаФилософияФинансыХимияЧерчениеЭкологияЭкономикаЭлектроника


COMPUTER CRIMES




 

The development of computer technology and its wide use have led to appearance and spread of computer crimes. Such situation causes alarm among those organizations and legislative institutions that use computer technologies and, of course, people, who use new informational services at homes.

The term "computer crime" was first used in the early 70s. However, the discussions concerning it are still actual. The top question of these discussions is '"What unlawful actions are implied by computer crime". A rank of definitions of the computer crime has been composed. It often refers to crimes directly or indirectly connected to electronic computing machines and which includes a number of illegal acts, committed by means of electronic data processing system or against it. Others consider that computer crime is any action, which goes together with interfering with property rights and fulfilled by means of computers. The thirds think that computer crime can be defined as all intentional and unlawful actions, which lead to causing harm to possessions, with help of computers too.

There are following forms of computer criminality: computer manipulations, economic espionage, sabotage, computer extortion, "hackers" activity. The main character of committing computer crimes in the business field becomes highly qualified "white collars" from the suffered organization's employees.

According to the MIS Traiding Institute (USA), they get 63% of all causes, examining crimes and abuses. More than 36% of law-committing employees are related to the personnel, which is not connected with computer servicing, 29% - qualified programmers, 25% - other workers of computing center. This tendency is reflected in official statistics too, according to which, about 40% ofcomputer crimes are committed for solving of financial problems, 20% are motivated as an intellectual challenge to society, 17% - by the willing of solving personal problems, 8% - problems of corporation or organization, 4% - are directed for social admitting, 3% - for wounding somebody's rights and so on.

The most dangerous individuals of computer swindle are so called "hackers", "crackers" and representatives of other groups, working in the sphere of industrial espionage. So, many security specialists advise employers to pay special attention to engaged workers-specialists in computer technologies, programming and information protection spheres.

There are many causes, when "hackers" get a job with a goal of personal enrichment. But the most danger can represent such specialists, who are in collusion with managers of commercial structures and organized criminal groups; in these situations causing damage and weight of consequences considerably increases.

There are two types of unsanctioned access:

· internal "breaking open" – the criminal has access to the terminal, with information he interested in and can work with it for some time without somebody's control;

· external "breaking open" – the criminal doesn't have indirect access to the computer system, but has an opportunity of penetration to the protected system by means of remote access;

Analysis of such actions shows that single crimes from own or neighbour work places gradually develop into network computer crimes, which are carried out by means of breaking of organizations' protecting systems.

Therefore, the importance of information protection can not be doubted. I think, every organization should have a high-quality protection system in order to insure its safety. However, not only companies and state institutions need information protection system but also general home users need information protection system and should maintain the security of their computers.

 

VI. Answer the following questions on the text.

What factors have led to the appearance and spread of computer crimes?
What does the term “computer crime” imply?
What are the forms of computer criminality?
What are the reasons of committing computer crimes?
Who is the main character of computer crimes?
What should be done to reduce the danger?

 

VII. Match parts of the sentences in columns A and B.

A B
    About 40% of computer crimes are committed for …   a   single crimes have gradually developed into network computer crimes.  
Some “hackers” get a job with … b engaged workers-specialists in computer technologies, programming and information protection spheres.
General computer users should maintain … c a goal of personal enrichment.
Analysis of such actions shows that … d solving of financial problems.
Employers are advised to pay special attention to … e the security of their computers.
The most danger can represent such specialists, who are… f in collusion with managers of commercial structures and organized criminal groups.

VIII. In each logical part of the text find topical words and phrases and make up an outline of the text.

 

IX. Give a short summary of the text according to the plan.

 

Part C

 

I. Read the following text and define its main ideas.

 


Поделиться:

Дата добавления: 2015-04-04; просмотров: 342; Мы поможем в написании вашей работы!; Нарушение авторских прав





lektsii.com - Лекции.Ком - 2014-2024 год. (0.006 сек.) Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав
Главная страница Случайная страница Контакты