Академический Документы
Профессиональный Документы
Культура Документы
Ingram
UWRT-1102
16 Mar 2015
called an IP address. The IP address is like a mailing address for your computer, and
determines how your internet service provider (i.e. Time warner) routes data
through there servers to your computer based on geographic location. When your
computer sends information to another device it is done by breaking that data into
small segments called packets. This process is similar to how computers
communicate on private networks and can be in succession to after information
travels through the internet to a private network. Now that the basics of how a
computer communicates have been established, we need to define cyber-crime.
Section 1030 in chapter 47 of title 18 of the U.S. Code defines cyber-crime as
intentionally accesses a computer without authorization or exceeds authorized
access and thereby obtains information from any protected computer or
knowingly causes the transmission of a program, information, code, or command,
and as a result of such conduct, intentionally causes damage without authorization,
to a protected computer (U.S. Code Section 1030 Ch. 47 Title 18). What I have
quote from the U.S. Code is the coverall clause of the legislation that would
adequately cover everything that comes prior to those clauses. So what cyber
criminals do is use the data stream that your computer creates with other servers to
alter those packets of information to gain access to or recover information from
those packets of information. In addition software can be transferred to your device
via a download which secretly uses that data stream to transfer information to the
attacker.