Computer forensics
January 11, 2014
Ann Wray-day
The internet has put the world literally at anyone’s fingertips with a vast quantity of information is a mouse-click away. Information that was once only available in obscure reference libraries or card catalogs can be accessed by everyone. Unfortunately the internet is an equal opportunity tool, and those with virtuous as well as nefarious intentions can use this open resource to further their efforts to levels heretofore unheard of. The internet is also soapbox for free speech that epitomizes the intentions of the founding fathers to allow everyone the same opportunity to have their opinions aired. There is a line that often blurs between legitimate and illegal behavior, when does harsh criticism become bullying, when does an expression of affection become harassment and how do the authorities differentiate between someone looking up an old classmate for rekindle a friendship and stalking a former girlfriend that spurned their overtures. The constitutional protections of free speech and requirements of specificity of regulations make the criminalization of inappropriate behavior.
CAUSES OF CYBER – CRIME
There are many reasons why cyber-criminals commit cyber-crime, chief among them are these three listed below: Cyber-crimes can be committed for the sake of recognition. This is basically committed by youngsters who want to be noticed and feel among the group of the big and tough guys in the society. They do not mean to hurt anyone in particular; they fall into the category of the Idealists; who just want to be in spotlight.
Another cause of cyber-crime is to make quick money. This group is greed motivated and is career criminals, who tamper with data on the net or system especially, e-commerce, e-banking data information with the sole aim of committing fraud and swindling money off unsuspecting customers.
Thirdly, cyber-crime can be committed to fight a
References: Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing. Network ICE Corporation (1998-2000). Password theft [On-line]. Available: http://www.netice.com Niccolai, J. (02/11/2000). Analyst puts recent hacker damage at $1.2 billion and rising [On-line]. Available: http://www.nwfusion.comn/news Real Secure (2001). [On-line]. Available: http://www.securehq.com Schindler, D.J. (2000, March). E-Crime and what to do about it. Los Angeles Business Journal. SilentRunnerTM. SilentRunnerTM [On-line]. Available: http://www.silentrunner.com/about/index.html. Teach, E. (1998, February). Look who 's hacking now. CFO, The Magazine for Senior Financial Executives.