StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Crime - Research Paper Example

Cite this document
Summary
Computer Science and IT Name University Computer Science and IT Computer crimes include internet fraud, business identity theft, and other criminal practices that result in a security breach. Hackers effectively use the internet to send malicious spam emails thereby tricking users to give out confidential information such as passwords, credit card PINs and to send on viruses and harmful softwares…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Computer Crime
Read Text Preview

Extract of sample "Computer Crime"

Download file to see previous pages

In July 2012 a major security breach took place against Yahoo that resulted in 450,000 usernames and passwords to be disclosed (Gonsalves, 2012). This event raised many questions regarding the precautionary measures taken by Yahoo to protect the security of its users. Instead of storing the passwords cryptographically they were stored as plain texts which made it very easy for hackers to gain access to this confidential data. Usually usernames and passwords are stored using the cryptography technique which encrypts the data thereby hiding the information.

This encryption prevents hackers from deciphering the data. Yahoo refused to give an interview but confirmed the breach saying that the data was stolen via its Contributor Network, which is one of the websites owned by Yahoo. Yahoo Contributor Network is a Yahoo website for freelance content writers that write articles for another of its website Yahoo Voice. Although only five percent of the stolen data had valid passwords, Yahoo announced that they were taking prompt action to fix the susceptibility that led to the exposure of the passwords.

Yahoo notified the other companies about the accounts that had been hacked including LinkedIn, Gmail, Hotmail, AOL, and so on (Gonsalves, 2012). The hacker group called D33Ds Company admitted to be responsible for the breach through a statement that they published on their website. The hackers said that the security breach was meant to be a warning for Yahoo and not a threat. They also alleged to having used the program SQL injection which is normally used to send instructions using the search field or a URL to breach a badly secured website.

The SQL injection allowed the hackers to gain access to the database containing the usernames and passwords (Gonsalves, 2012). The event happened just before the annual shareholder’s meetings at Yahoo and the temporary CEO Ross Levinsohn said that they were looking for a transparent strategy in order to bring back their investor confidence (Chaykowski & Robertson, 2012). According to Jordan Robertson in an interview given to Bloomberg (Yahoo Investigating Security Breach), it is not very embarrassing for a company like Yahoo because the stolen usernames and passwords were of mostly old and inactive accounts and the number 450,000 was not huge because it represented only a small fraction of people who were affected.

A spokesperson from Yahoo also previously mentioned that these numbers only made up about only one percent of the total Yahoo active users (Chaykowski & Robertson, 2012). Robertson said that the humiliating factor was the susceptibility of a company like Yahoo through a method called SQL injection. This is because it only involved very basic security measures to be prevented and Yahoo’s inability to create such a security protocol was embarrassing. As a result of the whole security breach event, Yahoo closed at $15.

69 in New York and its shares slid down by 2.7% in the same year (Chaykowski & Robertson, 2012). The Yahoo event did not only affect Yahoo Mail users but because its users signed up for the content writing website Contributor Network, the breach also resulted in retrieval of password for email accounts other than Yahoo such as Gmail, Hotmail, and AOL mail. One way this event could have been

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Crime Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1485443-computer-crime
(Computer Crime Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/information-technology/1485443-computer-crime.
“Computer Crime Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1485443-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Crime

Computer Crime and Security

In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p....
6 Pages (1500 words) Essay

Computer Crime and Cyber-Terrorism

The paper “Computer Crime and Cyber-Terrorism” seeks to evaluate online crime, which has now become a multi-billion dollar business.... Online crime may be of three types – phishing, malware and corporate attacks.... nbsp;Online crime has now become a multi-billion dollar business.... Online crime may be of three types – phishing, malware, and corporate attacks.... hellip; According to an expert in online risk management, the world of computer security is increasingly under threat....
8 Pages (2000 words) Essay

The Threat of Computer Crime

The paper "The Threat of Computer Crime" highlights that the property owners should take logical and rational steps to protect their properties so as to enforce laws relating to property rights.... Computer Crime is an offense where computers or electronic gadgets are used as a tool to carry out certain crimes.... Computer Crime circumscribes all sorts of illegal activities like the transgression of copyrights, child pornography, hacking, etc....
9 Pages (2250 words) Research Proposal

Categories of Computer Crime

Today, the biggest crime created through computer use is the electronic financial account transfer (Computer-Based crime, 2011).... Identity TheftTo date, identity theft has the fastest growing crime rate in America.... Computer-Based crime.... om/solutions/505-Computer-based-crime.... computer crimes may involve identity theft, cyberstalking, scams and frauds, hacking, creation of malicious codes, child pornography, and… Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files....
2 Pages (500 words) Essay

Study Case (computer Crime)

In the case, the defendant is accused of possessing a computer hard drive, which number Computer Crime Defendant was put into conviction in court and tried in the United s District Court.... Nevertheless, violation of the defendant does not make him less guilty or free from the crime committed.... In the case, the defendant is accused of possessing a computer hard drive, which contained visual depiction of a minor engaged in sexually explicit conduct, and a webcam....
2 Pages (500 words) Case Study

Malware, Computer Crime and Fraud

The essay "Malware, Computer Crime and Fraud" aims to examine the problem of invasion of privacy as a form of Computer Crime.... hellip; Computer Crime can be regarded as the unauthorized access and use of computer data by the users without prior permission.... This is also a class of Computer Crime.... Persecution and harassment is another class of Computer Crime which generally takes place in cyberspace.... If the criminal keeps sending the email to the person who doesn't want to receive such emails then it's a type of harassments and may be classified as Computer Crime....
6 Pages (1500 words) Research Paper

Computer Crime and the Measures That Can Curb the Crimes Caused On Computer

The essay "Computer Crime and the Measures That Can Curb the Crimes Caused On Computer" describes the potentially a variety of ways in which the various so-called privacy torts may provide protection from various behaviours that privacy statutes such as PIPEDA may not.... he term Computer Crime is very wide and it may also have a different definition that conveys the term Computer Crime as an illegal offense that is committed by a computer through a specific individual....
5 Pages (1250 words) Essay

Computer Crime File Content Analysis

The author of this paper "Computer Crime File Content Analysis" discusses the ways to analyze the content and to avoid the challenges, which may consist of fraud and crime.... The paper suggests the utilities be used in order to analyze the sites, the site status, IP address, and so on....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us