Tuesday, February 28, 2012

Describe the 8 examples of techno-crime below, identifying in each case whether it would constitute an act of sabotage, and why?The 8 examples of...

     A virus is a computer program that uses an executable
code to replicate itself in a target computer. When this executable code is integrated
into an email or program, the virus will be liberated and attack the new host computer.
A virus could be sabotage because it is the exploitation of the rights of others under a
malicious intent. Sending out viruses to crash dowh computers is indeed an act of
sabotage because it indicates the malicious intent and the planification of the act. It
also ruins the personal, private, financial, and academic projects of others who are
inocent victims.



Phishing is a criminal act in
which hackers infiltrate websites to get information of people using the internet such
as their usernames and passwords. This would be also sabotage because again it is
infiltrating in the protected information of other people with the intention of
obtaining sensitive information. It is also sabotage because it is maliciously intended
and planned ahead with the purpose of engaging in further criminal
activity.


A trojan horse-is a form of malware (see
definition of malware below) that is designed for hackers to access information from
other computers. Trojans are often hidden in applications such as bans, ads, even online
forms. Once the trojan horse is "let out", a hacker has officially entered the threshold
of a victim computer. This is indeed another way to maliciously steal information and
would constitute malicious activity, but to call it a sabotage would be a bit too much.
To a point, hackers know that people can protect themselves against trojans and all, so
many hackers do not do it to sabotage, but just to "have something to talk
about."


 Spyware is another form of malware (malicious
software) that is installed to secretly obtain information about the user such as credit
card numbers, location, and much more. This is sabotage because it totally is
intentional, has a malicious intent to steal very important and delicate information,
and can lead to crashing down a computer.


Hacker- A hacker
is the jargon name given to the person or persons who preoigram malware and implant
trojan horses and spyware on the internet with the purpose of stealing information.
Hackers can also program viruses. Only if the hacker creates malware or viruses that are
impossible to be protected from would be the time to call them "sabotagers". However, as
stated before, many hackers do it for fun, and not with the malicious intent to crash a
system or rob a bank.


Spamming is the action of overusing
emails and advertisements and attaching them to mass and bulk addresses. It is an abuse
of emailing privileges. Spamming is not sabotage because all it aims to do is to send
advertisements or sell a product, not to steal your information nor try to get personal
information.


Malware is a programmed computer application
or software which is designed to infiltrate into unsuspecting computers to obtain user
information. Sending out malware is an act of sabotage because it exploits the personal
information of individuals and it is done maliciously and with criminal
intent.


Logic Bombs are malware programs that are placed
into games, software, or any other application and are programmed to disrupt the
application, or to disrupt the function of the computer after a certain number of
activity has occurred. For example, after 10 uses or accesses of a certain application,
the malware will be released. It is called a "logic" bomb because it operates under a
specific plan of action. They are sabotage because they cause public fears, put
companies on extra heightened alerts, and basically put the world in a waiting game
which is unfair and silly to do. Since it is interrupting the basic lives of others and
affecting them negatively, it constitutes
sabotage.



All these constitute sabotage in one
way or another. Sabotage is the intention to disrupt. All these examples of techno-crime
are meant to disrupt programs that help people. This infringes in the personal rights
and freedoms of individuals. It is very much a case of sabotage.

No comments:

Post a Comment

In Act III, scene 2, why may the establishment of Claudius's guilt be considered the crisis of the revenge plot?

The crisis of a drama usually proceeds and leads to the climax.  In Shakespeare's Hamlet , the proof that Claudius is guilty...