Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Computer crime

Ex. 3. Fill in the gaps with the suitable words or word combinations | Settling disputes out of court | Ex. 3. Fill in the gaps with the suitable words or word combinations | Judges and juries | Ex. 3. Fill in the gaps with the suitable words or word combinations | General consideration | Crimes against the person | Ex. 3. Fill in the gaps with the suitable words or word combinations | Ex. 7. Problem solving | Ex. 1. Problem solving |


Читайте также:
  1. A FIRST LOOK AT COMPUTERS
  2. Active Directory Users and Computers
  3. Ali learned to use the computer. Then he taught his sister. 1 страница
  4. Ali learned to use the computer. Then he taught his sister. 2 страница
  5. Ali learned to use the computer. Then he taught his sister. 3 страница
  6. Ali learned to use the computer. Then he taught his sister. 4 страница
  7. An Electronic Computer

computer crime (n.) – преступление с использованием компьютера;

to embezzle (v.) – присваивать;

hacker (n.) – хакер;

"worms" (n.) – компьютерный червь;

Violator (n.) – нарушитель;

Furthermore (adv.) – кроме того, к тому же;

Annually (adv.) – ежегодно;

bulletin boards – электронная доска объявлений;

reluctant (adj.) – неохотный, вынужденный.

Computer crime is broadly defined as unauthorized access to, use of, alteration of, or taking of another person's computer systems or files. This activity is illegal even if the person does not intend to do any harm.

Corporate and government computer systems are the most popu­lar targets of computer crime. Some people who work for corpora­tions or the government may try to sell information to business rivals or foreign governments. Others may use computers to embez­zle money.

Most of those who gain unauthorized access to computer systems are "hackers." Hackers, sometimes high-school or college-age per­sons, intentionally try to break into computer systems. Once hackers enter a system, they usually look at confidential or classified files. Occasionally, a hacker may copy a file and distribute it. Hackers an­nually cause an estimated $1 billion worth of damage to computer files. There is disagreement on how hackers should be punished. Many persons feel that hackers are dangerous and should receive jail terms and pay large fines like other white-collar criminals. Oth­ers argue that hackers break into systems as a hobby, do not intend any harm, and can be rehabilitated.

Some hackers release "viruses" or "worms" into computer systems. Viruses are computer programs designed to play practical jokes or destroy data and damage computer files. Worms are designed to slow down computer systems but not to destroy data. Both viruses and worms are prohibited by computer crime laws.

Throughout the early 1980s, federal legislation related to comput­er crime, as well as traditional criminal statutes, were used to prose­cute computer criminals. However, the laws proved to be vague and ineffective. In response, Congress passed the Computer Fraud and Abuse Act of 1986, which provided the government with a specific law to prosecute hackers. The law made it a crime to modify, destroy, or disclose information gained from unauthorized entry into a com­puter. This law is jointly enforced by the United States Secret Ser­vice and the FBI.

In addition to the federal government, 48 states have laws on com­puter crime. Law enforcement officials are now applying traditional police procedures against computer criminals.

Despite the attention given to computer crimes, most probably go unreported. Many companies are reluctant to publicize their vulner­ability to computer criminals. Also, many are discouraged by the re­sources and time needed to prosecute individuals.

The federal government has also been carefully watching comput­er bulletin board systems. Bulletin boards allow users to exchange computer files and messages using computers and modems. Some of these bulletin boards make commercial software programs available to users. However, making the programs available without the pub­lisher's permission is illegal. Many bulletin board operators claim that users upload these programs without the operators' knowledge. However, many states hold the operator responsible for making sure that no illegal copies appear. Furthermore, the person downloading the program is in possession of illegal software.

Another type of computer crime occurs when someone illegally copies software he or she has purchased. Software companies lose over $2 billion each year to illegal copying. A person who opens a software package is agreeing to use the software on one computer only. This person is allowed to make copies of the software only to use as a backup. Placing software on more than one computer with­out the publisher's permission is illegal and violates federal copy right laws. The violator is subject to a possible jail term and a fine of up to $250,000. Violators can include individuals, businesses, and schools.

Computers have become a way of life for most people. Courts, Con­gress, and state legislatures will continue to deal with new criminal law problems as computer technology evolves.

Ex. 1. Find the equivalents for the following words and expressions in the text:

быть обескураженным, информационная система, файл, сообщение, нелегальные копии, компьютерная программа, программное обеспечение, пользователь, дистрибутив, компьютерный червь, электронная доска объявлений, хакер.

Ex. 2. Match the words on the left with the correct definition on the right:


Дата добавления: 2015-11-14; просмотров: 58 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Ex. 3. Fill in the gaps with the suitable words or word combinations| Ex. 3. Fill in the gaps with the suitable words or word combinations

mybiblioteka.su - 2015-2024 год. (0.007 сек.)