Computer Crime


A young man sits illuminated only by the light of a computer screen. His
fingers dance across the keyboard. While it appears that he is only word
processing or playing a game, he may be committing a felony.
In the state of Connecticut, computer crime is defined as: 53a-251. Computer
Crime
(a) Defined. A person commits computer crime when he violates any of the
provisions of this section.
(b) Unauthorized access to a computer system. (1) A person is guilty of the
computer crime of unauthorized access to a computer system when, knowing that he
is not authorized to do so, he accesses or causes the be accessed any computer
system without authorization...
(c) Theft of computer ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

or causes the denial of computer
services to an authorized user of a computer system.
(e) Misuse of computer system information. A person is guilty of the computer
crime of misuse of computer system information when: (1) As a result of his
accessing or causing to be accessed a computer system, he intentionally makes or
causes to be made an unauthorized display, use, disclosure or copy, in any form,
of data residing in, communicated by or produced by a computer system.

Penalties for committing computer crime range from a class B misdemeanor to a
class B felony. The severity of the penalty is determined based on the monetary
value of the damages inflicted. (2)

The law has not always had much success stopping computer crime. In 1990 there
was a nationwide crackdown on illicit computer hackers, with arrests, criminal
charges, one dramatic show-trial, several guilty pleas, and huge confiscations
of data and equipment all over the USA.

The Hacker Crackdown of 1990 was ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login

trying to compensate for the overflow.

This crash represented a major corporate embarrassment. Sixty thousand people
lost their telephone service completely. During the nine hours of effort that
it took to restore service, some seventy million telephone calls went
uncompleted.

Because of the date of the crash, Martin Luther King Day (the most politically
touchy holiday), and the absence of a physical cause of the destruction, AT&T
did not find it difficult to rouse suspicion that the network had not crashed
by itself- that it had been crashed, intentionally. By people the media has
called hackers.

Hackers define themselves as people who explore technology. If that ...

Succeed in your coursework without stepping into a library.
Get access to a growing library of notes, book reports,
and research papers in 2 minutes or less.


CITE THIS PAGE:

Computer Crime. (2008, April 21). Retrieved November 25, 2017, from http://www.essayworld.com/essays/Computer-Crime/82464
"Computer Crime." Essayworld.com. Essayworld.com, 21 Apr. 2008. Web. 25 Nov. 2017. <http://www.essayworld.com/essays/Computer-Crime/82464>
"Computer Crime." Essayworld.com. April 21, 2008. Accessed November 25, 2017. http://www.essayworld.com/essays/Computer-Crime/82464.
"Computer Crime." Essayworld.com. April 21, 2008. Accessed November 25, 2017. http://www.essayworld.com/essays/Computer-Crime/82464.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 4/21/2008 09:32:31 PM
Category: Computers
Type: Free Paper
Words: 2231
Pages: 9

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
Computer Crime Is Increasing
COMPUTER CRIME Hackers And Secu...
Computer Crime 3
Computer Crime 2
Computer Crime In The 90's
Computer Crime
Computer Crime
Computer Crime
Computer Crime: A Increasing Pr...
Computer Crime
Copyright | Cancel | Contact Us

Copyright © 2017 Essayworld. All rights reserved