Explain why intellectual property needs protection. Describe some of the methods used to commit cybercrimes

What will be an ideal response?


The text states three reasons why intellectual property needs protection. First, intellectual property theft costs at least $250 billion every year (Department of Justice 2006, 13). The cost may be a lot higher because businesses don't report these thefts, fearing it'll hurt business. Second, intellectual property thefts go undetected because of the difficulty of catching cybercriminals (Rustad 2001, 65). Third, cybercriminals are smart, skilled, and highly motivated, not just by money but by the darker and dangerous side of our nature—revenge, hate, ideology, and the powerful, seductive, addictive thrill of hacking. Methods used to commit cybercrimes include the following list: (1) Spoofing. When an attacker compromises routing packets to direct a file or transmission to a different location. (2) Piggybacking. Programs that hackers use to piggyback on other programs to enter computer systems. (3) Data diddling. The practice by employees and other knowledgeable insiders of altering or manipulating data, credit limits, or other financial information. (4) Salami attack. A series of minor computer crimes—slices of a larger crime—that are difficult to detect. (5) E-mail flood attack. When so much e-mail is sent to a target that the transfer agent is overwhelmed, causing other communication programs to destabilize and crash the system. (6) Password sniffing. Using password sniffing programs to monitor and record the name and password of network users as they log in and impersonating the authorized users to access restricted documents. (7) Worm. Uses a network to send copies of itself to other systems and it does so without any intervention. In general, worms harm the network and consume bandwidth, whereas viruses infect or corrupt files on a targeted computer. Viruses generally do not affect network performance, because their malicious activities are mostly confined within the target computer itself.

Criminal Justice

You might also like to view...

The 1980s law that mandated minimum sentences for federal drug convictions was the Comprehensive Crime Control Act

a. True b. False

Criminal Justice

The war on drugs has led to an increase in the population of ______ in jails.

a. wrongfully accused persons b. drug buyers c. low-level drug sellers d. drug kingpins

Criminal Justice

Which of the following is a theory that emphasizes gender involvement in crime?

A. feminist theory B. social control theory C. labeling theory D. biological theory

Criminal Justice

Answer the following statements true (T) or false (F)

1. Japan’s position as a world power is especially surprising since it is considerably smaller than countries like Italy and the United Kingdom. 2. Despite its seemingly commonsense nature, the parenting order in England and Wales does not appear to be having any positive affect on parenting skill, on parent-child relationships, or on reconviction rates of the young people whose parents were in the program. 3. Like most industrialized countries, the primary means of police deployment in Japan is by patrol car. 4. Koban in downtown Tokyo are called chuzaisho.

Criminal Justice