It has been more than 20 years since the first batch of PC viruses appeared. Since then, with the development of technology, the popularity of computers in more and more social fields and the use of computers by more and more people, the nature of threats has changed significantly. In any field of human activity, a generation stands on the shoulders of predecessors, learns from what they have done before, reapplies proven successful technologies, and tries to open up new fields. This also applies to people who create malicious code and who have redefined threat conditions for successive generations of malware authors.
Until a few years ago, viruses and other malicious programs were used to conduct isolated computer sabotage, that is, to use high-tech means for anti social self-expression. Most viruses are limited to infecting other disks or programs. The definition of corruption is mainly the data loss caused by deleting viruses or the data stored on the affected disks (very few).
That has changed. Today, cybercrime has become a major problem, with malware designed to make money illegally. The development of the world wide web has been one of the key factors to promote this change. Businesses and individuals are now heavily dependent on the Internet. The number of web-based financial transactions continues to grow. Underground criminals have realized the great opportunity to make money by using malicious code. Many of today’s threats are either written to order or developed specifically for sale to other criminals.
Crime is an inherent part of modern society, involving almost all aspects of life. So it’s no surprise that the use of computer technology has been misused: they have evolved in parallel. In addition, as more and more areas of our lives become more and more dependent on computers, criminals use technology more and more widely.
For any type of crime, society always tries to find ways to prevent crime and punish criminals. First, it means making legislation to outlaw specific activities.
Computer crimes fall into two categories. First of all, in the traditional crime, the use of computer is not inherent in the crime itself, but only a tool for crime. For example, if an email is sent to a victim rather than a letter, it may include blackmail. Second, there are specific computer crimes.
The case of the AIDS information Trojan illustrates this At the end of 1989, the company’s Trojan was distributed via floppy disks by a company called PC cyborg. The Trojan program encrypts the contents of the victim’s hard disk after 90 restarts, leaving only a readme that contains the bill and the post office address on which to pay. Dr. Joseph Pope (allegedly the author of the Trojan horse) was later extradited to the UK and tried for extortion and computer system damage (he was eventually considered unfit to appear in court and released).
The first UK legislation specifically for computer abuse was the computer Abuse Act 1990. The bill is in response to growing concerns that existing legislation is inadequate to deal with hackers. The failure to convict Stephen gold and Robert schifreen, who were granted unauthorized access to BTS Prestel services in 1984 and prosecuted under the forgeries and forgeries Act 1981, greatly alleviated the problem. The house of Lords later upheld the acquittal.
The computer Abuse Act 1990, which provides for the protection of computer data from unauthorized access or modification, lists three crimes of computer abuse for the purpose of contact.
Unauthorized access to computer materials
Unauthorized visit with intent to commit or promote further crime
Unauthorized modification of computer data