Statutes on Hacking
View Paper
ESSAY DETAILS
Words: 752
Pages: 3
(approximately 235 words/page)
Pages: 3
(approximately 235 words/page)
Essay Database > Literature > English
Legislative attention to computer crimes grew dramatically in the early 1980s, as computers became increasingly central to the conduct of business and politics. Instances of hackers, especially among young people, accessing government computer files for sport were becoming alarmingly frequent. A popular culture mythology developed, founded on the ex
ploits of what were regarded as rebel heroes who could single-handedly spy on and sabotage the vast machinations of the corporate and government establishment. Their stories
showed first 75 words of 752 total
Sign up for EssayTask and enjoy a huge collection of student essays, term papers and research papers. Improve your grade with our unique database!
showed first 75 words of 752 total
showed last 75 words of 752 total
Federal Reserve and the Treasury Department take extra measures to prevent unauthorized access to computers holding sensitive information. The Computer Abuse Amendments Act of 1994 expanded the 1986 Act to address the transmission of viruses and other harmful code. Sources "Hacker, 18, Gets Prison Term and Fine"; The Chicago Tribune; February 17, 1989 "House Passes 'Federal Interest' Interstate Computer Crime Bill; Computer Fraud, Abuse Penalized"; Computerworld; June 9, 1986 Alexander, Michael; "Prison Term For First U.S. Hacker Law Convict"; Computerworld; February 20, 1989
Federal Reserve and the Treasury Department take extra measures to prevent unauthorized access to computers holding sensitive information. The Computer Abuse Amendments Act of 1994 expanded the 1986 Act to address the transmission of viruses and other harmful code. Sources "Hacker, 18, Gets Prison Term and Fine"; The Chicago Tribune; February 17, 1989 "House Passes 'Federal Interest' Interstate Computer Crime Bill; Computer Fraud, Abuse Penalized"; Computerworld; June 9, 1986 Alexander, Michael; "Prison Term For First U.S. Hacker Law Convict"; Computerworld; February 20, 1989