1. World problems
  2. Unauthorized access to computer information systems

Unauthorized access to computer information systems

  • Computer database espionage
  • Computer hacking

Nature

Computer information systems are vulnerable to information invasion by unauthorized users. This is distinct problem at governmental levels where quantities of classified information are kept on computer disks. The possibilities of sabotage intimate that today's high-tech world poses new potential threats to national security.

On the international scale, opportunities for computer espionage due to inadequate safeguards presents a major problem. Computer espionage by foreign governments may encompass military, industrial, economic and commercial objectives, with business firms being the most vulnerable. Inadequate safeguards are almost universally found against computer sabotage.

Incidence

Crimes involving illegal use of telephones and computers are on the rise as computer literacy and computer access become commonplace at work and in the home. In the UK, the cost of hacking to enterprises is estimated at between £500 million to £2 billion per year. Hacking is reported by 20% of companies responding to a survey.

In November 1999 US citizen Eric Burns, age 19, who used the computer screen name "ZYKLON," was sentenced to 15 months imprisonment after pleading guilty to intentionally hacking a protected computer and causing damage. The defendant admitted that he had hacked and damaged computers in Virginia, Washington state, Washington, D.C., and London, England, including computers hosting the United States Information Agency and NATO pages on the World Wide Web, and the vice-president of the United States' Web page known as "21st Century.gov." Burns designed a program he called "Web Bandit" to identify computers on the Internet that were vulnerable to attack.

Counter-claim

Most computer break-ins are harmless and exploratory. A true hacker is not interested in the data they see, but the way the computer works. Their snooping may actually help protect people from invasions of privacy: they prove and publicize that private information may be accessible to unauthorized persons and so they can help deter government agencies to put telephone records, tax data etc. in computers. Hackers can also point out the mistakes of the system operators and the flaws in the security system.

Broader

Cybercrime
Excellent

Narrower

Aggravates

Aggravated by

Reduces

Strategy

Value

Unauthoritative
Yet to rate
Misinformation
Yet to rate
Information
Yet to rate
Espionage
Yet to rate
Disinformation
Yet to rate
Deformation
Yet to rate

Reference

SDG

Sustainable Development Goal #16: Peace and Justice Strong Institutions

Metadata

Database
World problems
Type
(E) Emanations of other problems
Subject
  • Cybernetics » Systems
  • Defence » Espionage, subversion
  • Informatics, classification » Informatics
  • Information » Data, codes
  • Information » Information
  • Law » Legality
  • Content quality
    Presentable
     Presentable
    Language
    English
    Last update
    Oct 4, 2020