亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer chrime - current practices, problems and proposed so.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                                   Computer Crime:                  Current Practices, Problems and Proposed Solutions          Second Draft          Brian J. Peretti               It would have been surprising if there had been satisfactory          road traffic legislation before  the invention of the  wheel, but          it would also have been surprising  if the law on the passage  of          laden  donkeys  proved  entirely  satisfactory  when  applied  to          vehicles.1          I.  Introduction               Within   recent   years,   computer  crime   has   become  a          preoccupation with law  enforcement officials.  In  California, a          group of  West German  hackers2 using  phone lines  and satellite          hookups, gained  unauthorized access into  civilian and  military          computers and  stole sensitive documents  that were  sold to  the          Soviet  Union.3    A  young  New York  programmer  broke  into  a          Washington computer to  run a program that he could  not run from          his personal  computer.4  After  Southeastern Bell Stated  that a          document  published in an  electronic publication5 was  valued at          more than $75,000 the publisher was arrested and brought to trial          before the discovery that  the document could be publicly  bought          from the company  for $12.6  The Chaos Computer  Club, a Hamburg,          Germany,  club,  went   into  government  computers   and  access          information and gave it to reporters.7  In May,  1988, the United          States government launched Operation Sun Devil, which lead to the          seizure  of  23,000   computer  disks  and  40  computers.8    In          addition,  poor police  performance9  has  also  been  blamed  on          computers.               Since  its  creation,  the computer  has  become  increasing          important in society.10   The law, as  in the past, has  not been          able   to  evolve   as   quickly   as   the   rapidly   expanding          technology.11  This  lack of movement on the  part of governments          shows a lack  of understanding with the area.  The need to create          a  comprehensive  regulation   or  code  of  ethics   has  become          increasing necessary.               Due   to  the   nature  of   computer   systems  and   their          transnational   connections   through   telephone   lines12,   an          individual  state's action will only stop the problems associated          with computer crime if many  states join together.  The patchwork          of  legislation that  exists  covers  only a  small  part of  the          problem.  To  adequately address computer crime,  greater efforts          must   be  made  within  the  computer  community  to  discourage          unauthorized computer access, countries must strengthen and             co-ordinated  their computer related  laws, as well  as proper          enforcement mechanism created, computer program copyright laws be          enhanced  and computer systems  should be created  to allow those          who wish to  explore computer systems which will  not disrupt the          users of computer systems.               This paper will first set out a definition of computer crime          and  why laws  or regulation  by the  computer community  must be          created.   Section  II will  then discuss  the United  States law          concerning  computer crime and  why it needs  to be strengthened.          Section  III will  discuss the  proposed  Israeli computer  crime          bill, Britain's  Computer Misuse  Act and  Ghana's proposed  law.          Section IV will  discuss what can be done by  both the government          and  computer  owners  and  users  to  make  computer  crime less          possible.          II.  Computer crime               The definition of what constitutes a computer crime has been          the  subject of  much controversy.    A computer  crime has  been          defined as  "any  illegal act  for  which knowledge  of  computer          technology  is  used  to  commit  an  offense."13    The  typical          computer criminal has  been described as between 15  and 45 years          old, usually male, no previous contact with law enforcement, goes          after both government and business, bright, motivated, fears loss          of status  in computer community  and views his acts  as games.14          For the  purposes of  this article, this  will be  the definition          used because of its broad reach.               Estimates regarding how much is lost to computer  crime very          widely15.   In  the only  authoritative  study, the  loss due  to          computer crime  was given  at $555,000,000,  930 personnel  years          lost  and 153 computer  time years lost.16   The  amount of total          incidents for  1988 was 485  resulting in 31 prosecutions17.   In          1987,  there were 335  incidents with 8  prosecutions.18 Security          spent   on  prevention  of   computer  crime  is   becoming  more          commonplace19.               The   most  publicized   danger  to  computer   systems  are          viruses20  and worms.    A virus  is a  code segment  which, when          executed,  replicates  itself   and  infects  another  program.21          These  viruses may  be created  anywhere in  the world22  and may          attack anything.23   A virus may be transmitted  through a trojan          horse24  program.  A  worm exists as  a program in  its own right          and  may spread over  a network via  electronic mail25.   A virus          attacks a program while  a worm attacks the computer's  operating          system.26      The  most  notorious  computer  worm  brought  the          Internet computer network to a halt.27               Computer  virus attacks  may  be overrated.28    It is  said          that the  biggest threat  to computing includes  "not backing  up          your  data, not  learning the  ins and  outs of  your application          programs,  not  putting  enough  memory  in  your  computer,  not          organizing your  hard  disk, [and]  not upgrading  to the  latest          version of  your applications.29   These  computer programs  have          been compared  to the AIDS virus.30   One author has  stated that          the  viruses are used  to both increase the  amount of profits of          computer program producers and anti-virus computer programs.31               Computer  viruses may  also  be  used  to  benefit  computer          systems,  by either  detecting  flaws  in  security  measures  or          detecting other  viruses.32   Virus are  very dangerous,  though.          The effects of a virus called Datacrime, activated on October 13,          1989, brought  down 35,000  personal computers  within the  Swiss          government and several companies in Holland.33               With the opening up of  Eastern Europe, the virus problem is          expected to  increase.34  In  Bulgaria, a country which  does not          have any laws  against computer  viruses, one  new virus  appears          week.35   Computer  viruses  are created  in  countries like  the          Soviet Union  as a way to punish  computer pirates because of the          lack of copyright laws.36               Perhaps  the most dangerous  threat to information contained          in a  computer is  the "leakage" of  radiation from  the computer          monitors.37   With inexpensive  equipment38 a  person can  "read"          the information  off the computer  screen and then  replicate the          information  from the screen in a readable manner.39               The threat of attack on a computer system can also come from          a  hacker.   A  hacker  is  a  person  who breaks  into,  whether          maliciously  or not, computers  or computer systems.40   A hacker          can, if the system is not adequately secured, cause havoc  in the          computer  by either  deleting  or altering  programs  or data  or          planting  logic  bombs  or  viruses  in  the  computer  system.41          Threats  from hackers  to plant  viruses  have been  made in  the          past.42  The  threat from computer hackers, as  with viruses, has          been said to be overrated.43               The issues surrounding computers still have not been decided          by those within  the computer community.  Whether  or not persons          should  be   allowed   to   access   computer   systems   without          authorization  is still a subject  of debate within the computing          community.    A West  German  Computing  Club, called  The  Chaos          Computing Club, holds the belief that it is not improper to enter          any system  which they can  gain access to  and to "look"  around          inside of  the  system as  much as  they wish.44    They do  not,          however,  condone destroying or  altering any of  the information          within  the  system.45      On the  other  side,  represented  by          Clifford Stoll, when individuals break into computer systems they          disrupt the trust  that the computer system is  based on.46  This          breach of trust  not only makes operating the  system tougher for          the manager in control  of the system, but also will decrease the          amount  of  use  of  the  system  so  less  information  will  be          transferred within the system.47               There is also conflicting views as to whether the authors of          computer  viruses should  be punished.    Marc Rotenberg48  holds          the  belief  that  a  virus  should be  granted  first  amendment          protection  in some  instances.49   In  response to  the Internet          worm, there were 21 editorials that stated that the attack showed          the  need for  more security  in  computers while  there were  10          letters  to  editors  that  stated that  the  creator  should  be          applauded rather  then punished.50   They argue  that this  was a          good way to  raise consciousness concerning computer  security.51          Alan Solomon, a consultant who specializes in virus detection and          eradication,   believes   that   viruses   are,   at   most,   an          inconvenience.52          III.United States Computer Legislation               The  United  States  government53  and  most  states54  have          computer crime laws.   In 1979, only six states had  such laws.55          Almost every  computer  crime will,  in addition  to violating  a          state and/or  federal law,  can  also be  prosecuted under  other          laws.56               A.   Computer Fraud and Abuse Act.               Congress originally  enacted the  Counterfeit Access  Device          and  Computer Fraud and  Abuse Act57   to address  the problem of          computer crime.  Understanding that the scope of the original law          was  too narrow,58  in 1986  Congress enacted  amendments  to the          Computer Fraud  and Misuse  Act of 1984.59   The  Act essentially          lists  acts that if  done with a  computer are illegal.   The Act          also  makes individuals  culpable  for  attempting  to  commit  a          computer crime.60               In order to commit any  of the crimes mentioned in  the act,          the actor must  have acted either "intentionally"  or "knowingly"          when committing  the act.   The law  addresses national  security          issues  by making a  crime of anyone  using a  computer to obtain          information and  giving the  information to  foreign countries.61          The penalty  for this crime  or its attempt  is 10 years  for the          first offense62  and 20  years for subsequent  offenses63.   If a          person   intentionally   accesses  a   computer   either  without          authorization or in excess  of his authorization and obtains  and          acquires information in  a financial record of  an institution or          information contained in  a financial record of  an individual64,          the person  will  have  committed  a misdemeanor  for  the  first          offense65 and  a  felony for  subsequent  offenses66.   A  person          intentionally   accessing    a   government    computer   without          authorization  which  affects  the   government's  use  of   that          computer67  will have  committed  a  misdemeanor  for  the  first          offense68 and  a felony  for the second  offense.69   Accessing a          computer with  knowledge and  intent to  defraud  and without  or          exceeding authority is a crime  if the person obtains anything of          value  other  than  use  is  a felony70.    Accessing  a  federal          interest computer  without  authorization  and  either  modifying          medical records or causing $1,000  or more worth of damage within          a one year  period71 is  punishable with  up to 5  years for  the          first offense72 and 10 years for any subsequent offense.73               The Act  also criminalizes  trafficking in  passwords.74   A          person  who knowingly  and with intent  to defraud  traffics75 in          passwords or similar  information may be sentenced for  up to one          year  for the first offense76  and up to  10 years for subsequent          offenses77 if the  computer is used by  or for the  Government of          the   United   States78   or   affects   interstate  or   foreign          commerce.79               B.   Criticisms               It is  important to note  that this statute only  applies to          "Federal interest computers"  as defined by  this section.80   If          a computer is  not this type of  computer, then any of  the above          mentioned crimes  will not  be prosecutable  under this  section.          Congress  intentionally  made the  scope  of the  law  narrow.81          This  section  has  been criticized  as  not  inclusive enough.82          Individual and  corporate computers  which do not  fall into  the          restrictive  definition83 may not  receive the protection  of the          statute.               The  problem  of  computer  viruses  are  not  addressed  by          Act.84  The act  does not punish  those who add information  into          a computer, even though this may do more harm then just accessing          information.   The Congress has  attempted to address  this issue          under two bills85, but neither one has been enacted.               Unauthorized access where there is no theft or damage to the          system  is  not  covered.86    For example,  a  person  access  a          computer  system and looks  at information contained  therein, he          has not committed a punishable crime under the Act.87               Questions have also been brought  up concerning many of  the          undefined terms  within the Act.88  Terms  such as "intentionally          access" and "affects interstate commerce" are among the terms not          defined.89   The  need to  clarify  these terms  is important  so          that an individual will know what action will constitute a crime.          IV.  Legislation From Around The World               A.   Israel Proposed Computer Law               In March 1987, the Israeli Ministry of Justice distributed a          draft of  a comprehensive  computer bill.90   This bill  covers a          wide range of  areas concerning computers91.  The  Act first sets          out  a  list  of  proposed  definitions  for  computer,  program,          software,  information,  thing and  act.   Each  of  these, while          short, are concise and attempt  to give a brief but comprehensive          definition.92               Chapter 2 sets  out a list of offenses  which, if committed,          are punishable.93   A authorized  person commits an act  upon any          computer and knows that the  act will prevent or cause disruption          of   the   proper   operation   is   subject   to   seven   years          imprisonment.94   A  person who,  without  authority, commits  an          act  which precludes  a person  from using  a computer  system or          deprives a person  of using that  system is  punishable by up  to          seven years  imprisonment.95  If  a person  prepares or  delivers          or  operates  software  knowing that  the  software  will produce          faulty results  and "having  reasonable grounds  to assume",  the          person  is punishable  for up  to seven  years.96   The  Act also          addresses those who supply, deliver  or  operates a computer with          faulty data.97               Section 5 applies to those who use a computer to  attempt to          obtain  some "thing"98  or  with  intent  prevents  another  from          obtaining some "thing".99   A  person who  prevents another  from          obtaining  a  "thing"  by  the   use  of  software  may  also  be          punished.100  A  person who deprives a  person of an object  that          contains  software, data or  information and obtaining  a benefit          for himself.101   All of  these crimes contain a  prison sentence          of five years.               A professional who relies on computer outputs that they know          which  are false  is also  subject to  punishment.102   The crime          carries a sentence of five years.103               This chapter does not apply to  all computers, software data          or  information.104   It  only applies  to those  computers, data          or information which  are used, designated to  be used by  or for          (1) the state  or a corporation that is supplying  service to the          public105  or   (2)  "business,  industry,   agriculture,  health          services, or for scientific purposes."106               Perhaps the most novel provision of this proposed law is the          section governing the reporting of  the offenses.  Any person who          is  in  charge  of another  and  has  reason to  believe  that an

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
五月婷婷色综合| 精品国产91乱码一区二区三区| 欧美午夜在线一二页| 欧美成人精精品一区二区频| 中文字幕精品—区二区四季| 婷婷中文字幕综合| 成人黄色777网| 欧美一级二级在线观看| 亚洲三级在线观看| 国产高清成人在线| 91.xcao| 国产精品五月天| 韩国视频一区二区| 8v天堂国产在线一区二区| 中文字幕日韩欧美一区二区三区| 日本一不卡视频| 91国偷自产一区二区开放时间 | 久久九九久久九九| 亚洲电影视频在线| 99久久伊人精品| 中文字幕av一区二区三区免费看| 日韩av电影天堂| 欧美日韩久久一区二区| 亚洲美女屁股眼交3| 粉嫩在线一区二区三区视频| 久久综合成人精品亚洲另类欧美| 日韩国产精品大片| 欧美三级电影一区| 亚洲国产视频a| 91久久国产综合久久| 中文字幕制服丝袜成人av| 国产凹凸在线观看一区二区| 久久综合五月天婷婷伊人| 日本一区中文字幕| 成人免费毛片app| 欧美人与z0zoxxxx视频| 久久免费国产精品| 亚洲曰韩产成在线| 国产米奇在线777精品观看| 97久久超碰国产精品电影| 欧美日韩高清在线| 中文字幕精品一区 | 欧美亚洲综合另类| 精品国产电影一区二区| 日韩美女精品在线| 久久电影网电视剧免费观看| 中文字幕不卡在线| 国产精品小仙女| 亚洲国产精品ⅴa在线观看| 成人av电影在线网| 亚洲蜜臀av乱码久久精品蜜桃| 91免费观看视频| 亚洲午夜久久久久久久久久久| 91高清在线观看| 天天影视涩香欲综合网 | 99精品国产99久久久久久白柏 | 91网址在线看| 亚洲影院免费观看| 91精品欧美一区二区三区综合在| 免费视频一区二区| 欧美一三区三区四区免费在线看| 免费人成网站在线观看欧美高清| 日韩免费一区二区三区在线播放| 国产精品66部| 日韩一区在线看| 欧美男生操女生| 国产精品系列在线播放| 亚洲女厕所小便bbb| 欧美日韩国产不卡| 国产成人欧美日韩在线电影| 一区二区三区视频在线看| 欧美一区二区三区在线观看视频| 国产精品一品二品| 一区二区三区在线免费观看| 日韩欧美中文字幕一区| 不卡的电视剧免费网站有什么| 亚洲成人综合网站| 中文一区二区完整视频在线观看| 欧美亚一区二区| 国产99一区视频免费| 亚洲成a天堂v人片| 亚洲国产激情av| 欧美精品久久久久久久多人混战| 成人综合在线观看| 美女精品一区二区| 樱花草国产18久久久久| 久久综合久久综合九色| 欧美日韩视频在线第一区| 国产成人综合视频| 在线视频国内自拍亚洲视频| 激情久久五月天| 亚洲高清免费观看高清完整版在线观看 | 成人免费看视频| 精品一区二区三区在线播放视频 | 日韩精品一区二区三区视频在线观看 | 欧美综合一区二区三区| 韩国欧美一区二区| 欧美剧情片在线观看| 一区二区三区在线观看视频| 7777精品伊人久久久大香线蕉经典版下载| 亚洲一二三专区| 日韩精品一区二区三区老鸭窝| 国产一区二区三区最好精华液| 国产精品美女久久久久久久网站| 在线区一区二视频| 国内一区二区在线| 一区二区三区在线播| 91麻豆精品国产自产在线观看一区 | 精品99999| 91免费看片在线观看| 奇米色777欧美一区二区| 国产欧美日韩精品a在线观看| 在线观看日韩电影| 韩国在线一区二区| 亚洲激情欧美激情| 久久美女高清视频| 欧美视频一区二区三区在线观看| 久久精品国产久精国产| 亚洲黄一区二区三区| 欧美精品一区二区三区蜜桃| 成人avav影音| 久久国产成人午夜av影院| 一区二区三区四区中文字幕| 久久奇米777| 欧美疯狂做受xxxx富婆| 成人免费观看男女羞羞视频| 亚洲第一主播视频| 中文字幕av免费专区久久| 欧美日韩免费一区二区三区| 国产在线麻豆精品观看| 亚洲va国产天堂va久久en| 国产精品久久久久影院色老大| 欧美亚洲免费在线一区| 成人听书哪个软件好| 五月激情六月综合| 亚洲乱码国产乱码精品精小说| 日韩精品一区二区三区四区 | 欧美日韩精品一二三区| 国产精品一区一区| 亚洲自拍偷拍九九九| 日本一区二区三区在线观看| 日韩美女一区二区三区| 99天天综合性| 成人h动漫精品一区二区| 精品一区二区三区在线播放 | 精品国内片67194| 欧美另类z0zxhd电影| 91在线精品秘密一区二区| 国产91精品露脸国语对白| 麻豆91精品视频| 免费观看30秒视频久久| 日韩—二三区免费观看av| 一区二区三区中文字幕| 一区二区高清视频在线观看| 中文字幕欧美日韩一区| 国产精品欧美经典| 欧美激情一区二区| 精品国产一二三区| 久久久久亚洲蜜桃| 欧美一区二区成人| 欧美变态凌虐bdsm| 精品久久一区二区三区| 欧美一区二区三区在线视频| 日韩欧美国产三级电影视频| 欧美欧美欧美欧美| 欧美日免费三级在线| 欧美色图在线观看| 欧美日韩一级大片网址| 99视频精品全部免费在线| 成人免费高清在线| 欧美丝袜丝交足nylons| 91精品国产一区二区| 欧美在线免费观看亚洲| 91精品国产综合久久婷婷香蕉| 欧美日韩专区在线| 欧美午夜寂寞影院| 日韩欧美久久久| 精品国产乱码久久久久久1区2区| 中文字幕av资源一区| 亚洲国产欧美另类丝袜| 欧美一区二区在线视频| 久久久噜噜噜久噜久久综合| 亚洲一区二区三区影院| www.日韩在线| 久久这里只有精品首页| 亚洲一区二区三区免费视频| 97se亚洲国产综合在线| 欧美videos大乳护士334| 亚洲国产精品精华液网站| 99热99精品| 久久精品亚洲乱码伦伦中文| 日韩黄色在线观看| 色综合久久88色综合天天免费| 3d成人h动漫网站入口| 国产精品久久久久久久久免费桃花 | 亚洲日本va午夜在线电影| 国产中文一区二区三区| 亚洲精品一区二区在线观看| 久久精品久久综合| 99久久免费视频.com|