Computer crime has also become a major threat to business. According to the Federal Bureau of Investigation, computer crime is the most expensive form of commercial crime. In 2003, theft of information cost over $70 million, with an average cost of $2.6 million per theft. Also in 2003, denial of service attacks, which deprived companies of revenue and idled IT investments, cost over $66 million, with an average loss of $1.4 million. Estimates of the dollar figure for theft by computer intrusion and attack total $201 million.

Although almost 75 percent of organizations reported some kind of attack in 2003, only about 40 percent of those attacked could quantify the loss. It is estimated that roughly 50 percent of intrusions were not reported at all, either because their scope was unknown or the publicity was undesired.

 

Even though there has been substantial publicity in recent years about computer system risks and attacks, it turns out that many organizations are unwilling to report system intrusions. Doing so can result in adverse publicity, the loss of public confidence, and the possible charge of managerial incompetence. Many organizations fear lawsuits based on the emerging "standard of due care."

In fact, there are reports that in the days before regulations such as Sarbanes-Oxley, which requires increased justification of the figures used in business accounting, some businesses paid hush money to intruders. In London, a number of firms have reportedly signed agreements with computer criminals offering them amnesty for returning part of the money stolen and, more importantly, for keeping quiet about their thefts. In one case, an assistant programmer at a merchant bank diverted eight million pounds to a Swiss account. In an agreement that protected him from prosecution, the programmer promised not to disclose the system penetrationand he got to keep one million pounds!

Recent statistics indicate that payment of hush money is decreasing, often due to increasingly automated nature of the attacks. Most attacks today are run by unsophisticated youth who learn a few tricks and gather a few scripts from true gurus, and then do what amounts to vandalism for the thrill of it. However, the thrill of penetration and creating havoc is increasingly offset by the penalities. The legal fate of some big time virus writers has been widely reported on TV and in the newspapers. Some murderers and rapists have gotten away with lighter sentences.

More recently, skillful intruders are attacking computers with criminal or military goals in mind. These attackers may outwit even sophisticated security systems, and can leave dormant sleeper programs that will lay low to avoid detection until their owners summon them to action.

belgesi-1965

Belgeci

Share
Published by
Belgeci

Recent Posts

Galata Kulesi

Galata Kulesi, dünyanın en eski kulelerinden biridir. 528 yılında Bizans İmparatoru Justinianus hükümdarlığı sırasında yapılmıştır.…

9 saat ago

Demir

Demir elementinin özellikleri Arı halde gümüşsü beyaz renkli bir metal olan demir (Fe), dünyada ki…

21 saat ago

Canlılarda Üreme ve Çoğalma

Üreme:Canlıların soylarının devamı için kendilerine benzer yavrular meydana getirmelerine denir.Eşeyli ve eşeysiz olarak iki şekilde…

1 gün ago

Ataol Behramoğlu

13 Nisan 1942'de İstanbul Çatalca'da doğdu. İlköğrenimini Kars ve Çankırı'da yaptı. 1966'de Ankara Üniversitesi Dil…

2 gün ago

O’na Hacker Denmez !

İnternet dünyasında maalesef gerek basında çıkan haberler olsun gerekse okuduğumuz makaleler olsun bize hep hackerlar…

2 gün ago

Replay Attacks [Yeniden Gönderme Saldırıları ]

Replay kelimesinin türkçeye tam olarak nasıl çevrildiğinden emin olamadığım için, başlığı yazarken  kendimce en manalı…

3 gün ago