Computer crime

Автор работы: Пользователь скрыл имя, 16 Декабря 2013 в 20:19, доклад

Описание работы

Computer crimes are on the rise with more and more companies reporting these crimes. According to McCollum, (2002) a survey was conducted and ninety three percent of those surveyed reported that there was some sort of security breach in their computers. The percentage of crime and the financial cost of the crime are both increasing. Most of the security breaches are external through the internet, while a small percentage of the crimes are carried out on the internal systems, but it is very difficult to identify whether the breach is external or internal.

Файлы: 1 файл

Computer crimes are on the rise with more and more companies reporting these crimes.docx

— 14.76 Кб (Скачать файл)

Computer crimes are on the rise with more and more companies reporting these crimes. According to McCollum, (2002) a survey was conducted and ninety three percent of those surveyed reported that there was some sort of security breach in their computers. The percentage of crime and the financial cost of the crime are both increasing. Most of the security breaches are external through the internet, while a small percentage of the crimes are carried out on the internal systems, but it is very difficult to identify whether the breach is external or internal.

Computer crimes are on the rise with more and more companies reporting these crimes. According to McCollum, (2002) a survey was conducted and ninety three percent of those surveyed reported that there was some sort of security breach in their computers. The percentage of crime and the financial cost of the crime are both increasing. Most of the security breaches are external through the internet, while a small percentage of the crimes are carried out on the internal systems, but it is very difficult to identify whether the breach is external or internal. In addition there is no formal and accurate reporting of these crimes, the reality still remains that Computer crimes are on the rise.

There are two reasons why the cyber crime seems to be on the rise:

  • Now more and more organizations are becoming aware of the problems associated with these crimes and also because in the past it was much more difficult to identify the breaches.
  • The use of internet is also increasing the incidence of these crimes as hackers breaching security. It is very difficult to secure networks and defend them with internet being part of the network of any organization

There are three types of computer crimes

  • Illegal use of a computer, which may include stealing a username and password, or may be related to getting into the victim’s computer through the Internet using alternative accesses activated by a Trojan Horse program.

Crime involving computers is often difficult to detect and can have serious effects on its victims. Advances in technology have made computer hackers and identity thieves more creative, but there are still a number of ways to help ensure that you do not fall victim to this type of violation. Whether your computer is on a local or wide area network or is a stand-alone unit with a simple Internet connection, take the necessary measures to protect your system from these crimes. Have A Firewall

Any computer network should be protected by a firewall. A firewall is a virtual barrier that disallows information from making its way into the network without authorisation. The firewall will block out any data that has not been intentionally permitted by the network administrator. While this is an extremely helpful preventive measure, it can be circumnavigated and it does nothing to protect the network from an internal problem.

Anti-Virus Software

The spread of computer viruses can be responsible for major losses of data and sometimes money or machinery. There are a number of antivirus software options that will help prevent these harmful programs from getting onto a network or a single computer.

Intrusion Detection Systems

An intrusion detection system (IDS) is a good secondary line of defence in addition to a firewall. An IDS can help indicate when an internal attack is taking place or when a hacker has bypassed a firewall and obtained access to the system, according to Interpol's website. This system identifies statistical deviations and points out unusual behaviour within the network. When activity that is inconsistent with the typical tasks performed on the network occur, the IDS flags the activity and its source, alerting the appropriate people that an intrusion may be happening. The system can also be programmed to detect when certain areas of the network are tampered with and can act as a sort of burglar alarm against intrusions.

Restrict Access To Computers

An obvious way to prevent computer crime is to properly restrict access to all terminals on a network or on a single computer in the home of office. Make sure access to the computer is only possible with a secret password to avoid physical intrusion on the home terminal. Do not leave the computer on and connected to the Internet when it is not in use. This may allow access via the connection to those trying to access your system and commit crimes. It is also a good idea to physically restrict access to the computer system in an office setting. Computers should be turned off, password protected as well as be secured behind locked doors when the office is unoccupied. Make it as difficult as possible for anyone to tamper with the machines.


Информация о работе Computer crime