.

Saturday, April 20, 2019

Crimes Against Information Systems Analysis Essay

Crimes Against Information Systems Analysis - Essay Example cyber-terrorism is the new crime preference to inflict havoc on the masses of society. Watson (2002) defines cyber-terrorism as the rehearse of cyber tools to shut down critical national infrastructures (such as energy, transportation, or government operations) for the purpose of coercing or intimidate a government or civilian population. (p.8) Over the years, the level of cyber-terrorism has evolved. Years ago, hackers attained propitiation by simply breaking into a system (Wilmot, 2004). However, Littleton (1995) still regards hackers as dangerous and further implies close at hand(predicate) danger by questioning the ability of a hacker to become a cyber-terrorist. Wilmot (2004) contends that hackers abilities to crack passwords or find a back door route through a security firewall shows that hackers can soft use a simple act to corrupt data in high technology. (p. 287). Though hackers utilise a more simplistic form of cyber-terrorism, and their trespassing is not as harmful as novel day crackers-those who seek to disable networks or systems-both hackers and crackers pose danger to the world that holds critical information. However, the edification of cyber-terrorists methods correlates with the degree of their motives.An intent Motives and Methods of Cyber-TerroristsAn intent of cyber-terrorist includes causing a devastating amount of trauma, while be elusive. To illustrate the elusiveness of a cyber-terrorist, Littleton (1995) uses two examples from the late 1980s. The identification, trial, and conviction of Robert T. Morris transpired only because he spoke of his creation, the 1988 Internet Worm, to several(prenominal) people. Rather, the author of the famous Michelangelo virus remains unidentified and escaped consequences altogether. The low risk of being captured coupled with the benefit of easily gaining access to restricted areas makes the crime of cyber-terrorism more appealing to criminals.Motives of cyber-terrorists range from evil to malice. Todays juveniles have joined the cyber-terrorist realm by defacing Web sites. However, Watson (2002) regards the less serious crimes as exceedingly consequential. When a site is defaced, its information is altered. Misleading information ultimately deceives viewers of the site and result in decrease of confidence and capital for owners of the site.Both hackers and crackers gain access to exclusive information by deciphering protective codes (Wilmot, 2004), which Littleton (1995) claims is not hard to do. A mischievous hacker seeks to only occupy an area considered mop up limits. On the other hand, a malicious cracker not only breaks codes to enter off-limits areas, but he or she seeks to vandalize or defile the area by causing immediate damage or planting viruses which slowly infiltrate and destroy systems that operate as critical infrastructures (Morris Wilmot, 2004).Impact of cyberwarAccording to Wilmot (2004), c itizens cannot function without the critical infrastructures of their communities. One part of the critical infrastructure extremely vulnerable to cyber-terrorism is the public safety system. Branches of the public safety

No comments:

Post a Comment