Friday, February 15, 2019
LOVE BUG Essay -- essays research papers
The Love Bug calculator virusThe virus dubbed the love bug started to speedyly spread throughout the reality on May 4, 2000. According to David Ruppe (May 5,2000) in an article on the ABCNEWS.com website, The virus came in the form of ILOVEYOU in the subject line, which seemed harmless and greets people in a friendly way. They pretend no idea that they are in for a big surprise as they opened their e-mail. The message indoors reads kindly check the attached LOVELETTER coming from me (Ruppe, May 5,2000). A 22-year-old college dropout was arrested in the Philippines as the author of this virus (anonymous, August 21,2000). When the attachment contained in the email was opened, the virus rapidly proliferated by automatically sending copies to everyone listed in the exploiters email address book. Experts have concluded that this was the cause of the rapid slow slew of servers around the world. Some of the servers have been so badly overloaded that they have shut down. This in t urn has been preventing other email from being se3nt (anonymous September 5, 2000).As Hillebrand reports, The Head of corp0orate communications at the computer Security Compevery Sophos Anit- Virus, Graham Cluely regulates that companies have been bombarded by this virus and have begun to switch off email systems. Cluely also concluded that one of the reasons that the virus is so popular because it makes a tug on your emotions, love empennage get you into trouble (Hillebrand May 15,2000).In this certain case thither are several categories of Cyber abuse that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was so-called to gather data once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victims Internet accounts to surf the net for free. (Ruppe May5, 2000). The second cybercrime kin is the computer as the in strumentality of the crime. Since the computer was the main focus of the crime and was used to implement it. The third and final cybercrime category is that the crime is associated with the preponderance of computers. This one is because it allowed the theft of the components of the login names as well as the passwords. This could be cl... ...o the fact that the professor was not afraid to come forward and say hey I might know this guy. I did not deal however the fact that the Philippine government had not law presidency this type of crime. These crimes affect everyone in the world not just down the street or another state. However since this has come to light the E-Commerce acquit has passed into law in the Philippines and carries a fine of at least $2,300 sum total three jail sentences. The credit card legislation has much lesser penalties. This Act however is not retroactive (Hillebrand May 15, 2000).Cited PageCasey, Eoghan. (2001) Pg. 17. digital Evidence and Computer Crime , Forensic Science computers and the Internet. London, Academic PressCasey, Eoghan. (2001) pg.167. digital Evidence and Computer Crime, Forensic Science computers and the Internet. London, Academic PressCharges reject Philippines Drop Charges In Love Bug Virus Case. (August 21, 2000). Associated Press, ABCNEWS.comHillebrand, Mary. (May 15,2000) Nations Gather To cigaret Cybercrime. E-Commerce Times.Revisiting the Case (Sept 5, 2000) Associated Press, ABCNEWS.comRuppe, David. (May 5, 2000) Love Bug Travels Around the Globe. ABCNEWS.com
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment