Computer Crime
A young man sits illuminated only by the light of a computer screen. His
fingers dance across the keyboard. While it appears that he is only word
processing or playing a game, he may be committing a felony.
In the state of Connecticut, computer crime is defined as: 53a-251. Computer
Crime
(a) Defined. A person commits computer crime when he violates any of the
provisions of this section.
(b) Unauthorized access to a computer system. (1) A person is guilty of the
computer crime of unauthorized access to a computer system when, knowing that he
is not authorized to do so, he accesses or causes the be accessed any computer
system without authorization...
(c) Theft of computer ...
Want to read the rest of this paper? Join Essayworld today to view this entire essay and over 50,000 other term papers
|
or causes the denial of computer
services to an authorized user of a computer system.
(e) Misuse of computer system information. A person is guilty of the computer
crime of misuse of computer system information when: (1) As a result of his
accessing or causing to be accessed a computer system, he intentionally makes or
causes to be made an unauthorized display, use, disclosure or copy, in any form,
of data residing in, communicated by or produced by a computer system.
Penalties for committing computer crime range from a class B misdemeanor to a
class B felony. The severity of the penalty is determined based on the monetary
value of the damages inflicted. (2)
The law has not always had much success stopping computer crime. In 1990 there
was a nationwide crackdown on illicit computer hackers, with arrests, criminal
charges, one dramatic show-trial, several guilty pleas, and huge confiscations
of data and equipment all over the USA.
The Hacker Crackdown of 1990 was ...
Get instant access to over 50,000 essays. Write better papers. Get better grades.
Already a member? Login
|
trying to compensate for the overflow.
This crash represented a major corporate embarrassment. Sixty thousand people
lost their telephone service completely. During the nine hours of effort that
it took to restore service, some seventy million telephone calls went
uncompleted.
Because of the date of the crash, Martin Luther King Day (the most politically
touchy holiday), and the absence of a physical cause of the destruction, AT&T
did not find it difficult to rouse suspicion that the network had not crashed
by itself- that it had been crashed, intentionally. By people the media has
called hackers.
Hackers define themselves as people who explore technology. If that ...
Succeed in your coursework without stepping into a library. Get access to a growing library of notes, book reports, and research papers in 2 minutes or less.
|
CITE THIS PAGE:
Computer Crime. (2008, April 21). Retrieved April 20, 2025, from http://www.essayworld.com/essays/Computer-Crime/82464
"Computer Crime." Essayworld.com. Essayworld.com, 21 Apr. 2008. Web. 20 Apr. 2025. <http://www.essayworld.com/essays/Computer-Crime/82464>
"Computer Crime." Essayworld.com. April 21, 2008. Accessed April 20, 2025. http://www.essayworld.com/essays/Computer-Crime/82464.
"Computer Crime." Essayworld.com. April 21, 2008. Accessed April 20, 2025. http://www.essayworld.com/essays/Computer-Crime/82464.
|