• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime, Security and Data Protection.

Extracts from this document...

Introduction

Computer Crime, Security and Data Protection Information Technology is a key component it the maintenance of our modern society. It is improving all the time, and in turn creates new opportunities. However, with the extent of criminals and fraud ICT is exploited. As information technology has spread, so too have computer crime and abuse. This is what this report will look at in great detail, and defines what Computer crime is and how it refers to the law. In this report I am going to cover the following areas on computer crime: * Computer crime and abuse * Computer crime and the law * Security threats to ICT systems * How to protect to ICT systems * Data Protection Legislation Computer Crime, abuse and the law As new technologies increase it creates new opportunities for crime, this is what computer crime and abuse entails. However, Computer abuse refers acts that are legal but unethical. For example; the Internet exploits this by having a lenient policy that computer abusers can create or construct lawful but very unsuitable sites for the innocent public to view. Here are some higher and lower case example of computer abuse situations... ...read more.

Middle

Worms invade a computer and steal its resources to replicate themselves. They use networks to spread themselves. A Trojan horse appears to do one thing but does something else. The system may accept it as one thing, but upon execution it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like the computer clock reaching a certain date. It might release a virus or be a virus itself. No defence No one connected to a computer network is really safe from hackers. But remember most invasions or infections don't result in serious injury to the system that has been attacked. The only real defence is limiting your risk by using virus scanners and enforcing security measures on network computers. But in the end, hackers see security systems as a challenge, not an obstacle. Computer fraud and crime In the world of computers, computer fraud and computer crime are very serious issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. ...read more.

Conclusion

Businesses lose three hundred million to about five billion dollars yearly due to these computer criminals; hackers or computer information thieves. Computer security has come a long way since the creation of computers. But still we cannot fully believe our computers are fully secure and safe from unwanted hackers. Computer security is very hard to create presently for anyone can get in if they know what to do. How to protect from Viruses Companies are becoming more aware and threatened by the fact that their computers are prone to attack. Virus scanners are becoming necessities on all machines. Installing and monitoring these virus scanners takes many hours and a lot of money for site licenses. Many server programs are coming equipped with a program called "netlog". This is a program that monitors the computer use of the employees in a company on the network. The program monitors memory and file usage. A qualified system administrator should be able to tell by the amounts of memory being used and the file usage if something is going on that should not be. If a virus is found, system administrators can pinpoint the user who put the virus into the network and investigate whether or not it was intended. Matthew Ainsworth 4/27/07 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    * Threats related to e-commerce There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    WAN This type of network covers a wider area. It is used over high speed, long distance communications such as computers in two different areas. A WAN can also be shared. For example two occupants in two buildings can share the wireless connection to a third person, or a business or anyone or anything they wish to do so.

  1. Hardware and software ICT revision notes

    You no longer need to remember complicated commands. For example to copy a file from the hard drive to a floppy disk you just drag it from one folder to another. Applications Software The various types of applications software include: * word processing * spreadsheets * databases * desktop publishing * graphics * personal organisers * e-mail *

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    This is similar to the 1984 Act fourth Principle but the new wider definition of processing is now applied. Organisations are required to state the purpose for which data is processed and cannot process it for any other purposes without further notification.

  1. Smart Card System

    Two examples of when we might use lock-and-key are as follows: 1. When we want a specific remote user (or group of remote users) to be able to access a host within our network, connecting from their remote host(s) via the Internet.

  2. System I designed in order to produce a promotion package for her newly formed ...

    This is where all the information (records) in the system are stored. It is important that a good understanding of the exact needs of the system is calculated, so that the database can be structured properly. I have used Microsoft Access to create the database for this system, because my system is based towards a small business environment.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    It is a low-level encryption scheme used to encrypt transactions in higher-level protocols such as HTTP, NNTP and FTP. The SSL protocol includes provisions for server authentication (verifying the server's identity to the client), encryption of data in transit, and optional client authentication (verifying the client's identity to the server).

  2. Future Developments in ICT

    read speeds peaking at only 50 mb/s versus an SSD?s 600 mb/s: This change by itself is enough to allow a computer running Windows 8 to boot in under 4 seconds. SSD?s are also able to withstand daily life in a laptop far better than a hard disk due to

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work