Christian Views On Cyber Crime

Improved Essays
The next major question that one must ask is, how should Christians view crime and the laws pertaining it. First of all, Christians should be involved in the political systems and should shape the laws to reflect what we believe. Laws should be Biblically based and should encourage people to stray from sin. They should be focused around the Ten Commandments, and should reflect the teaching of Jesus. In DLVK I-6 Charles Adams says, “We need to remember that there are always two levels of authority higher than any we might find given by any institution: the authority of our own conscience, and finally God’s authority as expressed in his Word.” While many laws do reflect this authority it is important for us to remember who is truly in control …show more content…
Companies are constantly working to improve the security of computers but the nature of the internet does not favor security, it favors crime. When looking at the design of the internet it is clear that hacking a server and stealing information is much easier than making a completely secure server. Joshua Corman, a leader in developing ideas on how to deal with this issue, explains this very well in a documentary about cyber security. “The nature of this domain, the nature of cyber, so to speak, is offense is really easy and defense is really really hard.” He compares the internet to a soccer game where you can score very easily but have a difficult time playing defense, because of this you will almost abandon playing defense and only attempt to score goals in order to win the game. Josh is mostly talking about cyber crime, but this also relates to identity theft. Playing defense, or protecting information on the internet, is much more difficult than stealing it. This is a major flaw in the design of the internet. As humans, we want to trust people to do the right thing and believe that they will only use technology for good. But, when a piece of technology is easier to use for bad than for good we need to take a step back and reevaluate the design. This issue goes beyond computers, all technology has an inherent bias designed into it. If this bias favors and …show more content…
There are already many steps being taken to reduce cyber crime and increase the safety of the internet. Currently there are new laws being passed that punish perpetrators. These laws are being updated to meet technological advances and even plan ahead for future advances. But, laws can only do so much. The government is also working very hard to increase the publics understanding of the internet. This is an important step that we as Christians should be apart of. We should insure that all forms to technology that we are invested in are understood by our users. We could also use this teaching as a way to share the gospel with others. While measures like these do help reduce the problem they do not solve it. The responsibly of security goes beyond the government and should be addressed at the root of the problem, the technology itself. Those who design the technology should be held accountable for making safe, secure software that can not be hacked. This is not going to be easy, it is going to require original, creative thinking that will reshape how we view and use technology. It should lead technological users to engage in common sense so that they understand what they are doing and are no longer passive in their use of the internet. This change is going to be difficult it will require us to slow down and stop developing new technology and focus on developing good technology. Creating perfect software however, is not

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the end, the web is just a tool; how you use will determine if it has a positive or negative outcome. People are used to living in a deterministic world where they think that the human choices and decisions have sufficient causes. The process of technology being more reliable and iterative is being feared by the creator themselves. Cyber-security expert, Colin Williams, explained how technology has always reshaped society and that “we tell ourselves stories to try to understand why and how.” Nowadays, we depend more on technology than we do with our brain.…

    • 972 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The 21st century has added a new weapon to the arsenal of persecutors. Credit card companies can lower a customer 's credit limit based solely on where they’ve shopped. An employer can make his or her decision on hiring an employee using just social media footprints. Lori Andrews presents frightening information in her essay “Facebook Is Using You”. Through the use of statistics, anecdotal evidence, and appeals to the audience 's sense of fear, she successfully convinces the reader that there is a need for a Do-Not-Track law.…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Crime is all a matter of perspective. To many people, crime is a distant idea for them, but it is always present in the world. It is something unacceptable that is looked down upon and is punishable by law. But to others, crime is the only option they are compelled to. The government has seemingly given up on them and they have nowhere else to go to acquire food in their stomachs and maybe a little bit of protection.…

    • 1888 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Re-entry is a challenge for all inmates, but it is especially more difficult for women. Female ex-inmates are economically marginalized because of the many different challenges they face when looking for employment. Men face the same barriers but the training jobs that are available to inmates are often focused on male dominated professions. The first step to help women offenders is to forgive them of their sins and offer them guidance to live law-abiding lives.…

    • 525 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Many reasons why identity theft is rampant is because credit bureaus, credit reporting agencies, and credit lenders do not hold themselves accountable for the theft. It has been estimated that millions of dollars are spent a year on identity theft victims. Businesses and companies offset the price of goods and services by making consumers pay higher prices (O’Neill & Xiao, 2005, p.33). Credit bureaus and lenders do not lose money on identity theft if anything it is a money making a scheme. Credit bureaus have suggested that money generated from credit reports and services are in the millions (Sovern, 2004, p.237).…

    • 122 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Outlook: American intelligence has grown significantly in the last 20 years. As technology keeps evolving, so will the Intelligence community (IC). With this technology advancement will come vulnerabilities, these vulnerabilities will be exposed and the IC will become stronger and wiser from experience. Computers is a significant vulnerability to the country want will be the place where the next significate war will be fought, because computer are such a vital part of daily life. Computers are woven into every aspect of life form government operations to controlling traffic lights in a city.…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    However, with every advancement comes the criminal exploits of vulnerabilities. This criminal element help create the notion of “policing” cyberspace, which enviably lead to the development of new tactics and techniques to secure…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    (Littleton) One month after the attacks of 9/11, a former national security cyber terrorism expert expressed concern about the launch of a cyber attack, which would cause confusion and panic. Most recently, the “SONY” attacks by North Korea and the hijacking of the web site ‘Ashley Madison’ by the group known as The Impact Team, was an attempt to not only destroy software or equipment, but was an act of cyber terrorism used to exploit sensitive information that could be detrimental to lives of politicians, business leaders, and thousands of others. (Ellyatt) “When a U.S. military plane crashed in Chinese territory in 2003 after computer hackers attacked American systems with viruses, the academic, Dr. Alan Ryan, warned that cyber terrorism was the way of the future and the nation’s security experts would have to focus their attention on the problem.” (Murrill)…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays