Unauthorized access to computer information systems

Other Names:
Computer database espionage
Computer hacking

Computer information systems are vulnerable to information invasion by unauthorized users. This is distinct problem at governmental levels where quantities of classified information are kept on computer disks. The possibilities of sabotage intimate that today's high-tech world poses new potential threats to national security.

On the international scale, opportunities for computer espionage due to inadequate safeguards presents a major problem. Computer espionage by foreign governments may encompass military, industrial, economic and commercial objectives, with business firms being the most vulnerable. Inadequate safeguards are almost universally found against computer sabotage.


Crimes involving illegal use of telephones and computers are on the rise as computer literacy and computer access become commonplace at work and in the home. In the UK, the cost of hacking to enterprises is estimated at between £500 million to £2 billion per year. Hacking is reported by 20% of companies responding to a survey.

In November 1999 US citizen Eric Burns, age 19, who used the computer screen name "ZYKLON," was sentenced to 15 months imprisonment after pleading guilty to intentionally hacking a protected computer and causing damage. The defendant admitted that he had hacked and damaged computers in Virginia, Washington state, Washington, D.C., and London, England, including computers hosting the United States Information Agency and NATO pages on the World Wide Web, and the vice-president of the United States' Web page known as "21st" Burns designed a program he called "Web Bandit" to identify computers on the Internet that were vulnerable to attack.

Related UN Sustainable Development Goals:
GOAL 16: Peace and Justice Strong Institutions
Problem Type:
E: Emanations of other problems
Date of last update
04.10.2020 – 22:48 CEST