.

Tuesday, March 26, 2019

LOVE BUG Essay -- essays research papers

The Love Bug computing device computer computer virusThe virus dubbed the love bug started to rapidly spread throughout the human race on May 4, 2000. According to David Ruppe (May 5,2000) in an article on the ABCNEWS.com website, The virus came in the form of ILOVEYOU in the subject line, which seemed harmless and greets people in a friendly way. They pass on no idea that they are in for a big surprise as they opened their electronic mail. The message internal reads kindly check the attached LOVELETTER coming from me (Ruppe, May 5,2000). A 22-year-old college dropout was arrested in the Philippines as the author of this virus (anonymous, August 21,2000). When the attachment contained in the email was opened, the virus rapidly proliferated by automatically sending copies to everyone listed in the users email address book. Experts have concluded that this was the cause of the rapid slow have of servers around the world. Some of the servers have been so sternly overloaded th at they have shut down. This in turn has been preventing other email from being se3nt (anonymous September 5, 2000).As Hillebrand reports, The Head of corp0orate communications at the computer Security Comp whatever Sophos Anit- Virus, Graham Cluely evidences that companies have been bombarded by this virus and have begun to switch off email systems. Cluely also concluded that one of the reasons that the virus is so popular because it makes a tug on your emotions, love earth-closet get you into trouble (Hillebrand May 15,2000).In this certain case there are several categories of Cyber iniquity that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was conjectural to gather randomness once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victims Internet accounts to surf the net for free. (Ruppe May5, 2000). Th e second cybercrime category is the computer as the instrumentality of the crime. Since the computer was the main focus of the crime and was used to implement it. The third and final cybercrime category is that the crime is associated with the prevalence of computers. This one is because it allowed the theft of the components of the login names as well as the passwords. This could be cl... ...o the fact that the professor was not afraid to come forward and say hey I might know this guy. I did not want however the fact that the Philippine government had not law government activity this type of crime. These crimes affect everyone in the world not just down the street or another state. However since this has come to light the E-Commerce stage has passed into law in the Philippines and carries a fine of at least $2,300 positivist three jail sentences. The credit card legislation has much lesser penalties. This Act however is not retroactive (Hillebrand May 15, 2000).Cited PageCas ey, Eoghan. (2001) Pg. 17. digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic PressCasey, Eoghan. (2001) pg.167. digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic PressCharges dismiss Philippines Drop Charges In Love Bug Virus Case. (August 21, 2000). Associated Press, ABCNEWS.comHillebrand, Mary. (May 15,2000) Nations Gather To sign Cybercrime. E-Commerce Times.Revisiting the Case (Sept 5, 2000) Associated Press, ABCNEWS.comRuppe, David. (May 5, 2000) Love Bug Travels Around the Globe. ABCNEWS.com

No comments:

Post a Comment