3.3 Computer Crime - 3.3d Computer Vandalism

3.3d Computer Vandalism



A particularly difficult problem for law-makers and computer designers is that the computer hacker is always attempting to interfere with other people's matters. They do this not for the sake of gain, but to prove that they are more clever than any secur ity system devised. It is not easy to see how they can be deterred. The fact that computer hacking is illegal, is what attracts them. The more sophisticated security is, the more determined the hacker is to break in past it.

Probably the most renowned form of computer vandalism, is the: "virus".
This appeared with the advent of the large-capacity hard disk for storing data on microcomputers. The annoying virus program, when loaded unknown to the user, can cause catastrophic consequences for any important information stored on the disk. It carri es out its merciless duty of rapidly creating copies of itself and eventually "spreads" into the computer's operating system.
Apart from totally erasing the data away from all computers it comes into contact with, it can insert permanent messages, change or scramble data, corrupt any programs or "sleep" doing nothing until the computer's clock reaches a certain time. A very famous example is the "Friday 13th" virus, which electronically destroys all records and files on the respective date.

Several computer groups, such as "Safe Hex" are continually searching for virus programmers. There are also several precautions to bear in mind when handling important, confidential data and encountering suspicious computer disks.

A computer virus is regarded as a "bad image" for programming.
Nevertheless, it will stay to this very day.


Computer Crime menu

Back to main menu

E-mail me at:
A.T.Pon@cs.cf.ac.uk
and give me any comments and suggestions. Thanks!