Читайте также:
|
|
computer crime (n.) – преступление с использованием компьютера;
to embezzle (v.) – присваивать;
hacker (n.) – хакер;
"worms" (n.) – компьютерный червь;
Violator (n.) – нарушитель;
Furthermore (adv.) – кроме того, к тому же;
Annually (adv.) – ежегодно;
bulletin boards – электронная доска объявлений;
reluctant (adj.) – неохотный, вынужденный.
Computer crime is broadly defined as unauthorized access to, use of, alteration of, or taking of another person's computer systems or files. This activity is illegal even if the person does not intend to do any harm.
Corporate and government computer systems are the most popular targets of computer crime. Some people who work for corporations or the government may try to sell information to business rivals or foreign governments. Others may use computers to embezzle money.
Most of those who gain unauthorized access to computer systems are "hackers." Hackers, sometimes high-school or college-age persons, intentionally try to break into computer systems. Once hackers enter a system, they usually look at confidential or classified files. Occasionally, a hacker may copy a file and distribute it. Hackers annually cause an estimated $1 billion worth of damage to computer files. There is disagreement on how hackers should be punished. Many persons feel that hackers are dangerous and should receive jail terms and pay large fines like other white-collar criminals. Others argue that hackers break into systems as a hobby, do not intend any harm, and can be rehabilitated.
Some hackers release "viruses" or "worms" into computer systems. Viruses are computer programs designed to play practical jokes or destroy data and damage computer files. Worms are designed to slow down computer systems but not to destroy data. Both viruses and worms are prohibited by computer crime laws.
Throughout the early 1980s, federal legislation related to computer crime, as well as traditional criminal statutes, were used to prosecute computer criminals. However, the laws proved to be vague and ineffective. In response, Congress passed the Computer Fraud and Abuse Act of 1986, which provided the government with a specific law to prosecute hackers. The law made it a crime to modify, destroy, or disclose information gained from unauthorized entry into a computer. This law is jointly enforced by the United States Secret Service and the FBI.
In addition to the federal government, 48 states have laws on computer crime. Law enforcement officials are now applying traditional police procedures against computer criminals.
Despite the attention given to computer crimes, most probably go unreported. Many companies are reluctant to publicize their vulnerability to computer criminals. Also, many are discouraged by the resources and time needed to prosecute individuals.
The federal government has also been carefully watching computer bulletin board systems. Bulletin boards allow users to exchange computer files and messages using computers and modems. Some of these bulletin boards make commercial software programs available to users. However, making the programs available without the publisher's permission is illegal. Many bulletin board operators claim that users upload these programs without the operators' knowledge. However, many states hold the operator responsible for making sure that no illegal copies appear. Furthermore, the person downloading the program is in possession of illegal software.
Another type of computer crime occurs when someone illegally copies software he or she has purchased. Software companies lose over $2 billion each year to illegal copying. A person who opens a software package is agreeing to use the software on one computer only. This person is allowed to make copies of the software only to use as a backup. Placing software on more than one computer without the publisher's permission is illegal and violates federal copy right laws. The violator is subject to a possible jail term and a fine of up to $250,000. Violators can include individuals, businesses, and schools.
Computers have become a way of life for most people. Courts, Congress, and state legislatures will continue to deal with new criminal law problems as computer technology evolves.
Ex. 1. Find the equivalents for the following words and expressions in the text:
быть обескураженным, информационная система, файл, сообщение, нелегальные копии, компьютерная программа, программное обеспечение, пользователь, дистрибутив, компьютерный червь, электронная доска объявлений, хакер.
Ex. 2. Match the words on the left with the correct definition on the right:
Дата добавления: 2015-11-14; просмотров: 58 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Ex. 3. Fill in the gaps with the suitable words or word combinations | | | Ex. 3. Fill in the gaps with the suitable words or word combinations |