首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
Computer Crime A computer crime is generally defined as one that involves the use of computers and software for illegal purp
Computer Crime A computer crime is generally defined as one that involves the use of computers and software for illegal purp
admin
2010-08-04
31
问题
Computer Crime
A computer crime is generally defined as one that involves the use of computers and software for illegal purposes. This doesn’t mean that all the crimes are new types of crime. On the contrary, many of these crimes, such as embezzlement of funds, the alteration of records, theft, vandalism, sabotage, and terrorism, can be committed without a computer. But with a computer, these offenses can be carried out more quickly and with less chance that the person responsible for the crime will be discovered.
Computer crimes are on the rise and have been for the last twelve years. Just how much these computer crimes cost the American public is in dispute, but estimates range from $ 3 billion to $ 5 billion annually. Even the FBI, which attempts to keep track of the growth or decline of all kinds of crimes, is unable to say precisely how large a loss is involved; however, it estimates that the average take from a company hit by computer crime is $ 600,000. A number of reasons are given for the increase in computer crime: (A) more computers in use and, thus, more people who are familiar with basic computer operation; (B) more computers tied together in satellite and other data-transmission networks; and (C) the easy access of microcomputers to huge mainframe data bases.
The Criminal
Movies and newspaper stories might lead us to believe that most computer crimes are committed by teenage "hackers"--brilliant and basically good children who let their imagination and technical genius get them into trouble. But a realistic look at the crimes reveals that the offender is likely to be an employee of the firm against which the crime has been committed, i. e. , an "insider".
Difficulty of Detection and Prevention
Given the kind of person who commits a computer crime and the environment in which the crime occurs, it is often difficult to detect who the criminal is. First of all, the crime may be so complex that months or years go by before anyone discovers it.
Second, once the crime has been revealed, it is not easy to find a clear trail of evidence that leads back to the guilty party. After all, looking for "weapons" or fingerprints does not occur as it might in the investigation of more conventional crimes.
Third, there are usually no witnesses to the computer crime, even though it may be taking place in a room filled with people. Who is to say if the person at the next terminal, calmly keying in data, is doing the company’s work or committing a criminal act?
Fourth, not enough people in management and law enforcement know enough about computer technology to prevent the crimes. Authorities have to be familiar with the computer’s capabilities within a given situation to guard against its misuses. In some large cities, such as Los Angeles, police departments have set up specially trained computer crime units.
But even when an offender is caught, the investigators, attorneys (律师), judges, or juries may find the alleged crime too complicated and perplexing to handle. More attorneys are specializing in computer law and studying the computer’s potential for misuse.
After a computer crime has been discovered, many companies do not report it or prosecute (起诉) the person responsible. A company may not announce the crime out of fear that the pubic will find out the Weaknesses of its computer system and lose confidence in its organization. Banks, credit card companies, and investment firms are especially sensitive about revealing their vulnerabilities (脆弱性) because they rely heavily on customer trust.
To avoid public attention, cautious companies will often settle cases of computer tampering out of court. And if cases do go to trial and the offenders are convicted, they may be punished only by a fine or light sentence because the judge or jury isn’t fully trained to understand the nature and seriousness of the crime.
Not all companies are timid in apprehending computer criminals. For example, Connecticut General Life Insurance Company decided it had to get tough on violators. So when the company discovered that one of its computer technicians had embezzled $ 200,000 by entering false benefit claims, it presented it findings to the state’s attorney and aided in the prosecution of the technician. The technician was found guilty and sentenced to prison, not just for the computer misuse, but also for grand theft and insurance fraud. Connecticut General now has a policy of reporting all incidents of theft or fraud, no matter how small.
Banks, credit card companies, and investment’ firms are especially sensitive about revealing their vulnerabilities because they place too much reliance on ______.
选项
答案
customer trust
解析
答案依据为本文第九段最后一句话。
转载请注明原文地址:https://jikaoti.com/ti/s6tFFFFM
0
大学英语四级
相关试题推荐
A、Thetransportationforthetripisfree.B、Theclassdon’tenjoygoingonthefieldtrip.C、Somepeoplemaynotgoonthetrip
TheOlympicGamesOriginsTheancientGreeksfirsthadtheideaof,gettingmentogethereveryfouryearstoholdandwi
BritishteachingunionsSundaycautiouslywelcomedgovernmentplanstoextendschoolopeninghoursforpupilsagesunder14that
Manystudentsfindtheexperienceofattendinguniversitylecturestobeaconfusingandfrustratingexperience.Thelecturersp
Overthepast600years,Englishhasgrownfromalanguageoffewspeakerstobecomethedominantlanguageofinternationalcomm
A、Lookinginthelibrarycardcatalog.B、Studyingforanexam.C、Readingthenewspaper.D、Exercisinginthegym.C
A、Becausehedoesn’twanttomakealivinglikeordinarypeople.B、Becauseonlytheprisoncanhelphimtocontrolhimself.C、Be
Betweenabout1910and1930,newartisticmovementsinEuropeanartweremakingthemselvesfeltintheUnitedStates.Americana
A、Theproblemofpoverty.B、Theproblemofhavingfewchildren.C、Theproblemofpoorlivingconditions.D、Theproblemofdivorc
Everyoneseemstobeinfavorofprogress.But"progress"isafunnyword.Itdoesn’tnecessarilymeanthatsomethinghasbecome
随机试题
A、壁细胞B、主细胞C、黏液细胞D、幽门黏膜中G细胞E、胃黏膜表面上皮细胞分泌胃泌素的是
下列所述关于采用人工补偿来提高功率因数的主要措施包括什么?()
堤身填筑采用机械施工,其分段作业面长度应()m。
中国证监会颁布的()正式打破了此前只有商业银行担任托管人的市场格局。
2012年1月1日,甲公司向其30名管理人员每人授予300股股票期权这些期权自2012年在授予日的公允价值为20元,第一年有8名管理人员离开公司预计整个等待期内离职总人数会达到40%则2012年末企业贷记“资本公积”()元
在教学活动中,教师不能满足于“授人以鱼”,更要做到“授人以渔”。这说明教学中应该重视()。
下列有关研究性学习的表述,错误的是()
A、 B、 C、 D、 C本题考查的是旋转问题,第一组图中“树干”与小黑点逆时针旋转。第二组图同样是旋转问题,外边的白圈顺时针旋转,里面的黑圈逆时针旋转。故选C。
鲁迅先生在《中国小说史略》中评价明朝小说:“当神魔小说盛行的时候,讲世情的小说,也就起来了,其原因,当然也离不开那时的社会状态……这种小说,大概都叙述些风流放纵的事情,间悲欢离合之中,写炎凉的世态。其最著名的,是《金瓶梅》。”《金瓶梅》盛行的“社会状态”主
一个20人的班级举行百分制测验,平均分为79分,所有人得分都是整数且任意两人得分不同。班级前5名的平均分正好是16到20名平均分的2倍。则班级第6名和第15名之间的分差最大为多少分?
最新回复
(
0
)