亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? computer chrime - current practices, problems and proposed so.txt

?? 黑客培訓教程
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
                                   Computer Crime:                  Current Practices, Problems and Proposed Solutions          Second Draft          Brian J. Peretti               It would have been surprising if there had been satisfactory          road traffic legislation before  the invention of the  wheel, but          it would also have been surprising  if the law on the passage  of          laden  donkeys  proved  entirely  satisfactory  when  applied  to          vehicles.1          I.  Introduction               Within   recent   years,   computer  crime   has   become  a          preoccupation with law  enforcement officials.  In  California, a          group of  West German  hackers2 using  phone lines  and satellite          hookups, gained  unauthorized access into  civilian and  military          computers and  stole sensitive documents  that were  sold to  the          Soviet  Union.3    A  young  New York  programmer  broke  into  a          Washington computer to  run a program that he could  not run from          his personal  computer.4  After  Southeastern Bell Stated  that a          document  published in an  electronic publication5 was  valued at          more than $75,000 the publisher was arrested and brought to trial          before the discovery that  the document could be publicly  bought          from the company  for $12.6  The Chaos Computer  Club, a Hamburg,          Germany,  club,  went   into  government  computers   and  access          information and gave it to reporters.7  In May,  1988, the United          States government launched Operation Sun Devil, which lead to the          seizure  of  23,000   computer  disks  and  40  computers.8    In          addition,  poor police  performance9  has  also  been  blamed  on          computers.               Since  its  creation,  the computer  has  become  increasing          important in society.10   The law, as  in the past, has  not been          able   to  evolve   as   quickly   as   the   rapidly   expanding          technology.11  This  lack of movement on the  part of governments          shows a lack  of understanding with the area.  The need to create          a  comprehensive  regulation   or  code  of  ethics   has  become          increasing necessary.               Due   to  the   nature  of   computer   systems  and   their          transnational   connections   through   telephone   lines12,   an          individual  state's action will only stop the problems associated          with computer crime if many  states join together.  The patchwork          of  legislation that  exists  covers  only a  small  part of  the          problem.  To  adequately address computer crime,  greater efforts          must   be  made  within  the  computer  community  to  discourage          unauthorized computer access, countries must strengthen and             co-ordinated  their computer related  laws, as well  as proper          enforcement mechanism created, computer program copyright laws be          enhanced  and computer systems  should be created  to allow those          who wish to  explore computer systems which will  not disrupt the          users of computer systems.               This paper will first set out a definition of computer crime          and  why laws  or regulation  by the  computer community  must be          created.   Section  II will  then discuss  the United  States law          concerning  computer crime and  why it needs  to be strengthened.          Section  III will  discuss the  proposed  Israeli computer  crime          bill, Britain's  Computer Misuse  Act and  Ghana's proposed  law.          Section IV will  discuss what can be done by  both the government          and  computer  owners  and  users  to  make  computer  crime less          possible.          II.  Computer crime               The definition of what constitutes a computer crime has been          the  subject of  much controversy.    A computer  crime has  been          defined as  "any  illegal act  for  which knowledge  of  computer          technology  is  used  to  commit  an  offense."13    The  typical          computer criminal has  been described as between 15  and 45 years          old, usually male, no previous contact with law enforcement, goes          after both government and business, bright, motivated, fears loss          of status  in computer community  and views his acts  as games.14          For the  purposes of  this article, this  will be  the definition          used because of its broad reach.               Estimates regarding how much is lost to computer  crime very          widely15.   In  the only  authoritative  study, the  loss due  to          computer crime  was given  at $555,000,000,  930 personnel  years          lost  and 153 computer  time years lost.16   The  amount of total          incidents for  1988 was 485  resulting in 31 prosecutions17.   In          1987,  there were 335  incidents with 8  prosecutions.18 Security          spent   on  prevention  of   computer  crime  is   becoming  more          commonplace19.               The   most  publicized   danger  to  computer   systems  are          viruses20  and worms.    A virus  is a  code segment  which, when          executed,  replicates  itself   and  infects  another  program.21          These  viruses may  be created  anywhere in  the world22  and may          attack anything.23   A virus may be transmitted  through a trojan          horse24  program.  A  worm exists as  a program in  its own right          and  may spread over  a network via  electronic mail25.   A virus          attacks a program while  a worm attacks the computer's  operating          system.26      The  most  notorious  computer  worm  brought  the          Internet computer network to a halt.27               Computer  virus attacks  may  be overrated.28    It is  said          that the  biggest threat  to computing includes  "not backing  up          your  data, not  learning the  ins and  outs of  your application          programs,  not  putting  enough  memory  in  your  computer,  not          organizing your  hard  disk, [and]  not upgrading  to the  latest          version of  your applications.29   These  computer programs  have          been compared  to the AIDS virus.30   One author has  stated that          the  viruses are used  to both increase the  amount of profits of          computer program producers and anti-virus computer programs.31               Computer  viruses may  also  be  used  to  benefit  computer          systems,  by either  detecting  flaws  in  security  measures  or          detecting other  viruses.32   Virus are  very dangerous,  though.          The effects of a virus called Datacrime, activated on October 13,          1989, brought  down 35,000  personal computers  within the  Swiss          government and several companies in Holland.33               With the opening up of  Eastern Europe, the virus problem is          expected to  increase.34  In  Bulgaria, a country which  does not          have any laws  against computer  viruses, one  new virus  appears          week.35   Computer  viruses  are created  in  countries like  the          Soviet Union  as a way to punish  computer pirates because of the          lack of copyright laws.36               Perhaps  the most dangerous  threat to information contained          in a  computer is  the "leakage" of  radiation from  the computer          monitors.37   With inexpensive  equipment38 a  person can  "read"          the information  off the computer  screen and then  replicate the          information  from the screen in a readable manner.39               The threat of attack on a computer system can also come from          a  hacker.   A  hacker  is  a  person  who breaks  into,  whether          maliciously  or not, computers  or computer systems.40   A hacker          can, if the system is not adequately secured, cause havoc  in the          computer  by either  deleting  or altering  programs  or data  or          planting  logic  bombs  or  viruses  in  the  computer  system.41          Threats  from hackers  to plant  viruses  have been  made in  the          past.42  The  threat from computer hackers, as  with viruses, has          been said to be overrated.43               The issues surrounding computers still have not been decided          by those within  the computer community.  Whether  or not persons          should  be   allowed   to   access   computer   systems   without          authorization  is still a subject  of debate within the computing          community.    A West  German  Computing  Club, called  The  Chaos          Computing Club, holds the belief that it is not improper to enter          any system  which they can  gain access to  and to "look"  around          inside of  the  system as  much as  they wish.44    They do  not,          however,  condone destroying or  altering any of  the information          within  the  system.45      On the  other  side,  represented  by          Clifford Stoll, when individuals break into computer systems they          disrupt the trust  that the computer system is  based on.46  This          breach of trust  not only makes operating the  system tougher for          the manager in control  of the system, but also will decrease the          amount  of  use  of  the  system  so  less  information  will  be          transferred within the system.47               There is also conflicting views as to whether the authors of          computer  viruses should  be punished.    Marc Rotenberg48  holds          the  belief  that  a  virus  should be  granted  first  amendment          protection  in some  instances.49   In  response to  the Internet          worm, there were 21 editorials that stated that the attack showed          the  need for  more security  in  computers while  there were  10          letters  to  editors  that  stated that  the  creator  should  be          applauded rather  then punished.50   They argue  that this  was a          good way to  raise consciousness concerning computer  security.51          Alan Solomon, a consultant who specializes in virus detection and          eradication,   believes   that   viruses   are,   at   most,   an          inconvenience.52          III.United States Computer Legislation               The  United  States  government53  and  most  states54  have          computer crime laws.   In 1979, only six states had  such laws.55          Almost every  computer  crime will,  in addition  to violating  a          state and/or  federal law,  can  also be  prosecuted under  other          laws.56               A.   Computer Fraud and Abuse Act.               Congress originally  enacted the  Counterfeit Access  Device          and  Computer Fraud and  Abuse Act57   to address  the problem of          computer crime.  Understanding that the scope of the original law          was  too narrow,58  in 1986  Congress enacted  amendments  to the          Computer Fraud  and Misuse  Act of 1984.59   The  Act essentially          lists  acts that if  done with a  computer are illegal.   The Act          also  makes individuals  culpable  for  attempting  to  commit  a          computer crime.60               In order to commit any  of the crimes mentioned in  the act,          the actor must  have acted either "intentionally"  or "knowingly"          when committing  the act.   The law  addresses national  security          issues  by making a  crime of anyone  using a  computer to obtain          information and  giving the  information to  foreign countries.61          The penalty  for this crime  or its attempt  is 10 years  for the          first offense62  and 20  years for subsequent  offenses63.   If a          person   intentionally   accesses  a   computer   either  without          authorization or in excess  of his authorization and obtains  and          acquires information in  a financial record of  an institution or          information contained in  a financial record of  an individual64,          the person  will  have  committed  a misdemeanor  for  the  first          offense65 and  a  felony for  subsequent  offenses66.   A  person          intentionally   accessing    a   government    computer   without          authorization  which  affects  the   government's  use  of   that          computer67  will have  committed  a  misdemeanor  for  the  first          offense68 and  a felony  for the second  offense.69   Accessing a          computer with  knowledge and  intent to  defraud  and without  or          exceeding authority is a crime  if the person obtains anything of          value  other  than  use  is  a felony70.    Accessing  a  federal          interest computer  without  authorization  and  either  modifying          medical records or causing $1,000  or more worth of damage within          a one year  period71 is  punishable with  up to 5  years for  the          first offense72 and 10 years for any subsequent offense.73               The Act  also criminalizes  trafficking in  passwords.74   A          person  who knowingly  and with intent  to defraud  traffics75 in          passwords or similar  information may be sentenced for  up to one          year  for the first offense76  and up to  10 years for subsequent          offenses77 if the  computer is used by  or for the  Government of          the   United   States78   or   affects   interstate  or   foreign          commerce.79               B.   Criticisms               It is  important to note  that this statute only  applies to          "Federal interest computers"  as defined by  this section.80   If          a computer is  not this type of  computer, then any of  the above          mentioned crimes  will not  be prosecutable  under this  section.          Congress  intentionally  made the  scope  of the  law  narrow.81          This  section  has  been criticized  as  not  inclusive enough.82          Individual and  corporate computers  which do not  fall into  the          restrictive  definition83 may not  receive the protection  of the          statute.               The  problem  of  computer  viruses  are  not  addressed  by          Act.84  The act  does not punish  those who add information  into          a computer, even though this may do more harm then just accessing          information.   The Congress has  attempted to address  this issue          under two bills85, but neither one has been enacted.               Unauthorized access where there is no theft or damage to the          system  is  not  covered.86    For example,  a  person  access  a          computer  system and looks  at information contained  therein, he          has not committed a punishable crime under the Act.87               Questions have also been brought  up concerning many of  the          undefined terms  within the Act.88  Terms  such as "intentionally          access" and "affects interstate commerce" are among the terms not          defined.89   The  need to  clarify  these terms  is important  so          that an individual will know what action will constitute a crime.          IV.  Legislation From Around The World               A.   Israel Proposed Computer Law               In March 1987, the Israeli Ministry of Justice distributed a          draft of  a comprehensive  computer bill.90   This bill  covers a          wide range of  areas concerning computers91.  The  Act first sets          out  a  list  of  proposed  definitions  for  computer,  program,          software,  information,  thing and  act.   Each  of  these, while          short, are concise and attempt  to give a brief but comprehensive          definition.92               Chapter 2 sets  out a list of offenses  which, if committed,          are punishable.93   A authorized  person commits an act  upon any          computer and knows that the  act will prevent or cause disruption          of   the   proper   operation   is   subject   to   seven   years          imprisonment.94   A  person who,  without  authority, commits  an          act  which precludes  a person  from using  a computer  system or          deprives a person  of using that  system is  punishable by up  to          seven years  imprisonment.95  If  a person  prepares or  delivers          or  operates  software  knowing that  the  software  will produce          faulty results  and "having  reasonable grounds  to assume",  the          person  is punishable  for up  to seven  years.96   The  Act also          addresses those who supply, deliver  or  operates a computer with          faulty data.97               Section 5 applies to those who use a computer to  attempt to          obtain  some "thing"98  or  with  intent  prevents  another  from          obtaining some "thing".99   A  person who  prevents another  from          obtaining  a  "thing"  by  the   use  of  software  may  also  be          punished.100  A  person who deprives a  person of an object  that          contains  software, data or  information and obtaining  a benefit          for himself.101   All of  these crimes contain a  prison sentence          of five years.               A professional who relies on computer outputs that they know          which  are false  is also  subject to  punishment.102   The crime          carries a sentence of five years.103               This chapter does not apply to  all computers, software data          or  information.104   It  only applies  to those  computers, data          or information which  are used, designated to  be used by  or for          (1) the state  or a corporation that is supplying  service to the          public105  or   (2)  "business,  industry,   agriculture,  health          services, or for scientific purposes."106               Perhaps the most novel provision of this proposed law is the          section governing the reporting of  the offenses.  Any person who          is  in  charge  of another  and  has  reason to  believe  that an

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美视频一区二区在线观看| 久久综合丝袜日本网| 欧美伦理视频网站| 欧美激情综合五月色丁香| 亚洲成人久久影院| 成人的网站免费观看| 欧美一二区视频| 一区二区三区丝袜| 成人午夜在线免费| 日韩欧美色电影| 夜夜嗨av一区二区三区中文字幕 | 在线播放欧美女士性生活| 国产欧美久久久精品影院| 日韩一区精品视频| 色婷婷综合久久久中文一区二区 | 精品国产精品网麻豆系列| 一区二区三区在线免费观看| 国产美女娇喘av呻吟久久| 日韩欧美成人一区| 日韩精品免费专区| 欧美精品1区2区3区| 亚洲视频一二三区| 99国产欧美久久久精品| 国产日韩欧美麻豆| 国产酒店精品激情| 国产日韩影视精品| 国产精品一区久久久久| 精品国产91亚洲一区二区三区婷婷 | 亚洲丝袜美腿综合| 成人美女在线观看| 亚洲国产高清在线| 国产福利一区二区三区在线视频| 日韩片之四级片| 久久疯狂做爰流白浆xx| 欧美大片在线观看一区| 毛片基地黄久久久久久天堂| 日韩一区二区免费视频| 免费不卡在线视频| 日韩视频在线观看一区二区| 久久精品国产77777蜜臀| 日韩欧美一二三四区| 精品写真视频在线观看 | 91麻豆免费在线观看| 亚洲欧美视频一区| 色就色 综合激情| 一区二区三区资源| 欧美剧情片在线观看| 久久电影网电视剧免费观看| 久久综合国产精品| 成人福利电影精品一区二区在线观看| 国产精品久久三| 欧洲av一区二区嗯嗯嗯啊| 午夜天堂影视香蕉久久| 91麻豆精品国产91久久久更新时间| 日韩成人午夜精品| 久久九九全国免费| 一道本成人在线| 日韩精品成人一区二区在线| 精品国产一区二区精华| www.亚洲在线| 午夜在线成人av| 国产精品亲子伦对白| eeuss鲁片一区二区三区在线观看| 亚洲另类在线一区| 日韩视频免费观看高清在线视频| 国产伦精一区二区三区| 一区二区三区国产| 欧美videossexotv100| 波多野结衣亚洲| 日韩激情视频在线观看| 欧美国产日韩一二三区| 欧美精品日韩一本| 高清成人免费视频| 日韩电影免费一区| 亚洲欧洲美洲综合色网| 日韩精品一区二区三区在线播放 | 亚洲一区成人在线| 久久在线观看免费| 欧美性猛交xxxxxx富婆| 国产一二三精品| 午夜精品福利一区二区三区av | 国产精品天天看| 床上的激情91.| 精品久久人人做人人爽| av在线不卡电影| 日韩精品亚洲一区二区三区免费| 欧美激情一区二区| 日韩欧美国产一区二区在线播放 | 一区二区三区美女| 精品久久人人做人人爱| 欧美在线视频你懂得| 国产高清精品久久久久| 日韩福利电影在线观看| 亚洲欧美激情在线| 国产日本一区二区| 精品免费日韩av| 欧美理论在线播放| 色吊一区二区三区| 成人免费视频视频在线观看免费| 蜜桃一区二区三区在线| 亚洲国产一二三| 亚洲男人的天堂网| 国产精品美女久久久久高潮 | 欧美精品日韩一区| 欧美中文字幕一区二区三区| 97久久精品人人澡人人爽| 国产美女久久久久| 久久国产成人午夜av影院| 亚州成人在线电影| 一卡二卡三卡日韩欧美| 亚洲人一二三区| 亚洲精品国产高清久久伦理二区| 亚洲国产精品精华液2区45| 26uuu成人网一区二区三区| 欧美电影免费观看完整版| 欧美一区二区三区不卡| 91精品国产一区二区三区香蕉| 91九色02白丝porn| 欧美视频一区二区三区在线观看| 色综合天天综合在线视频| 91在线观看视频| 色婷婷狠狠综合| 在线观看日韩一区| 欧美日韩一区高清| 日韩一区二区三区在线视频| 3d动漫精品啪啪一区二区竹菊| 69堂亚洲精品首页| 欧美一区二区高清| 久久综合久久综合九色| 国产蜜臀97一区二区三区| 国产精品盗摄一区二区三区| 自拍av一区二区三区| 亚洲电影在线播放| 日本欧美一区二区三区| 国内精品久久久久影院一蜜桃| 国产精品亚洲视频| 9i看片成人免费高清| 欧美探花视频资源| 日韩欧美视频在线| 亚洲国产精品国自产拍av| 亚洲视频网在线直播| 亚洲成国产人片在线观看| 老司机精品视频在线| 国产91丝袜在线18| 欧美亚洲动漫精品| 欧美xingq一区二区| 国产精品视频第一区| 亚洲国产一区二区三区青草影视| 蜜臂av日日欢夜夜爽一区| 成人午夜激情片| 欧美日韩在线观看一区二区| 精品国产sm最大网站免费看| 国产精品三级av在线播放| 亚洲国产精品自拍| 国产成人精品三级| 欧美日韩一区二区三区免费看| 欧美成人精品二区三区99精品| 中文字幕在线观看不卡| 日韩国产欧美在线观看| 波多野结衣视频一区| 欧美一区二区日韩| 亚洲乱码国产乱码精品精98午夜 | 亚洲一线二线三线视频| 国内精品在线播放| 欧美日韩在线综合| 国产精品久久久久久户外露出| 日本不卡高清视频| 色视频欧美一区二区三区| 2023国产精华国产精品| 亚洲va欧美va天堂v国产综合| 成人av资源在线| 欧美大片在线观看| 亚洲午夜成aⅴ人片| av在线不卡观看免费观看| xfplay精品久久| 青青草一区二区三区| 欧美专区日韩专区| 综合久久久久综合| 国产成人精品亚洲午夜麻豆| 日韩欧美一二区| 图片区小说区区亚洲影院| 色婷婷久久一区二区三区麻豆| 久久伊99综合婷婷久久伊| 热久久久久久久| 欧美精品一二三| 亚洲精品va在线观看| 粗大黑人巨茎大战欧美成人| 久久蜜桃av一区二区天堂| 久久se这里有精品| 91精品国产高清一区二区三区| 亚洲国产人成综合网站| 色视频欧美一区二区三区| 最近中文字幕一区二区三区| 国产99久久久国产精品潘金| www国产成人免费观看视频 深夜成人网| 午夜av电影一区| 666欧美在线视频| 日韩精品亚洲一区二区三区免费| 欧美日韩激情一区二区| 亚洲图片自拍偷拍|