Hacking - cybercrime

Introduction

Cybercrime wasin progress to develop in the recent past, with the improvement of computer systems and technologies. Today, there are regularincidences intrusion into PC systems of large businesses, for advantage. These declines in systems,currently can be perform almost from all individuals, and all you need is good computer skills and a good rate. The age structure of perpetrators of these criminal acts is diverse.
Hacker is a concept in computing that can mean several things. Hackers are people who know very well computers, software, and hardware. As a term, many controversies are in the professional circles. The beginning of controversy is in the misuse of the term in the media where there is a common picture of them as criminals. They are often replaced with virus writers and intruders that enter into information systems. Hackers are people who like to have a positive curiosity to explore the limits of what is possible, often involving the overhaul of existing hardware and software solutions to gain a new function or unlock a hidden one.
Most of these individual are from technologically advanced countries, where the technique and technology far more progressive with respect to our country. The reasons that perform these activities are also diverse. Often it’s obtaining illegal profit, the damage of confident databases, deactivating some servers that are of great significance or is it stealing some data that have a countlessmeasureable value but are significant for the committer of that act for further reasons.
This study aims to investigate the cybercrime, in order to answer the thesis statement, which is: “The cybercrime is harmful for the privacy of the people and organizations.”

The term cybercrime


Computer (PC) in each case is one of the most significant and most revolutionary accomplishments of hi-techevolution. But, in addition to the many advantages that carries humanity, the computer has quickly become a tool of mishandling by persons, groups or even organization. In this way a PC wrongdoing as uncommon and particular type of the structure of present day culpability, the size and attributes. This merits the consideration of the state and its organs and even whole international group.
Thanks to the enormous power of computers in memorizing and fast processing of large amounts of data, automated information systems are becoming more numerous and almost indispensable part of the whole social life of all subjects at all levels. That computer becomes the everyday and essential part (segment) of all spheres of social life of the production, transport, service delivery to the national defense and security in the broadest sense.
The computer becomes a means of performing various forms of illegal, unlawful and socially dangerous activities. Of course, Cybercrime under whose collective title includes all these diverse forms and forms of behavior related to the misuse of computers and information systems there is no generally accepted definition. Thus, in the literature for the criminal diversified computer crime using different terms, such as misuse of computers, computer fraud, tort by computer, computer crime and techno crime.
This type of crime as opposed to the other does not represent a still rounded by phenomenological category, and it is impossible to define a unique and precise conceptual definition. Cybercrime is a crime that is directed against the security of information (computer, computer) system in order to be himself or for another some gain or to other causes damage.
Cybercrime is according to some defined as misuse of computers in terms of each event that is related to the use of computer technology in which the victim suffers or is likely to suffer loss, but the offender acts with the intention of acquiring or could obtain the benefit. Some Cybercrime defined as the commission of offenses for which the computer appears as a tool or object protection or as the use of computers in the exercise of fraud, evasion or abuse.

The characteristics of cybercrime




Cybercrime is primarily characterized by its dynamics and a number of forms. This is understandable because it is a new technology with great possibilities as it applies to almost all areas of social life. There are also new, much more dangerous forms of criminal behavior, which until now were not known in criminal law, which know no borders between countries but not between continents.
The harmful consequences of cyber crime are extremely high. They may exhibit and the occurrence of property damage to natural or legal person and sometimes for the whole country. Even the perpetrators of crimes related to the misuse of computers represent a special, often a specific category of people. There is usually a non-delinquent, non-powerful, generally adaptable persons. Usually, these arepersons who still need to have special expertise and practical skills and knowledge in the field of high data technology, PC and PC technology and which are such technological fundsaccessible. These are criminal acts carried out covertly, often without some visible and close spatial connection between the perpetrator acts and victims (injured). Most often hard to detect and even harder to prove a long time remain virtually undiscovered until damaged not suffer any damage that is visible in the system of computer information. It is a crime that rapidly changing forms and forms of expression, the border between the two countries and the type of damaged .

Raids in the system


Nowadays, hackers generally motivates profit. For this reason they carry out numerous incursions into systems. The final outcome of a typical taking control of a computer by hackers could be the case with your computer or server on tens of thousands of messages with advertising or compromising content on different address, or through your server sold hill of banned products and information. Such crimes today are quickly discovering a trace of the sender ultimately leads to - your computer .

Conclusion



Although it is today impossible life and functioning is not citizens but not the country as anentire, without the use of PCs and present information technology, is acognizance that this valuable and very essential resources can be used for illegal, illegitimate objectives, mainly for gaining illegal profit to anindividual or to damage others. Because our reality in last years notedmany cases of abuse of computers for illegal purposes it was high period that the state not only preventive measures but also the system of criminal sanctions to grips with these irresponsible individuals and groups.
That was the main motive to our country joins a number of countries that in their system of criminal laws provide various types and forms of computer crime for which they prescribe severe penalties. In the system of the criminalization prevail different cases of unlawful, unauthorized intrusion into people's computers and computer systems of other persons (natural persons, legal entities or state authorities or public services).
Such illicit activities may be different from alteration, destruction, damage to the utilization and use of unauthorized obtained data. Most often this works undertaken with a particular mental element on the side of the perpetrator - the intent to himself or another obtain a benefit (or other property) or the other of causing damage. If such a gain obtained or whether such damage done to it is a serious, qualified forms for which the statutory crackdown.
We hope that the implementation of these legal provisions largely suppress and prevent a number of unlawful conduct in relation to the computer or through a computer, which will protect human and social goods and values, security and trust in computer systems and the protection of human rights and freedoms will receive quality higher level.

Comments

Popular Posts