• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime, Security and Data Protection.

Extracts from this document...

Introduction

Computer Crime, Security and Data Protection Information Technology is a key component it the maintenance of our modern society. It is improving all the time, and in turn creates new opportunities. However, with the extent of criminals and fraud ICT is exploited. As information technology has spread, so too have computer crime and abuse. This is what this report will look at in great detail, and defines what Computer crime is and how it refers to the law. In this report I am going to cover the following areas on computer crime: * Computer crime and abuse * Computer crime and the law * Security threats to ICT systems * How to protect to ICT systems * Data Protection Legislation Computer Crime, abuse and the law As new technologies increase it creates new opportunities for crime, this is what computer crime and abuse entails. However, Computer abuse refers acts that are legal but unethical. For example; the Internet exploits this by having a lenient policy that computer abusers can create or construct lawful but very unsuitable sites for the innocent public to view. Here are some higher and lower case example of computer abuse situations... ...read more.

Middle

Worms invade a computer and steal its resources to replicate themselves. They use networks to spread themselves. A Trojan horse appears to do one thing but does something else. The system may accept it as one thing, but upon execution it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like the computer clock reaching a certain date. It might release a virus or be a virus itself. No defence No one connected to a computer network is really safe from hackers. But remember most invasions or infections don't result in serious injury to the system that has been attacked. The only real defence is limiting your risk by using virus scanners and enforcing security measures on network computers. But in the end, hackers see security systems as a challenge, not an obstacle. Computer fraud and crime In the world of computers, computer fraud and computer crime are very serious issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. ...read more.

Conclusion

Businesses lose three hundred million to about five billion dollars yearly due to these computer criminals; hackers or computer information thieves. Computer security has come a long way since the creation of computers. But still we cannot fully believe our computers are fully secure and safe from unwanted hackers. Computer security is very hard to create presently for anyone can get in if they know what to do. How to protect from Viruses Companies are becoming more aware and threatened by the fact that their computers are prone to attack. Virus scanners are becoming necessities on all machines. Installing and monitoring these virus scanners takes many hours and a lot of money for site licenses. Many server programs are coming equipped with a program called "netlog". This is a program that monitors the computer use of the employees in a company on the network. The program monitors memory and file usage. A qualified system administrator should be able to tell by the amounts of memory being used and the file usage if something is going on that should not be. If a virus is found, system administrators can pinpoint the user who put the virus into the network and investigate whether or not it was intended. Matthew Ainsworth 4/27/07 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    * Threats related to e-commerce There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers.

  2. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk.

  1. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    Also it has made more people to be more committed to being watchful of their diet and people use it as way of working out, basically having your own gym in your personal inn. P2 - explain the fundamental principles of HCI design Perception; Perception is the way that we see things as an individual.

  2. Hardware and software ICT revision notes

    DOS was difficult to work with because commands had to be entered in an exact way and there were a lot of different codes for the ordinary everyday user to remember. Windows was first introduced in 1985 and is now the most popular PC operating system.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    By informing the data subject or, By notifying the Data Protection Commissioner. This is in addition to notification (registration). All controllers must notify and pay the notification fee. 3/Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.

  2. AS ICT Corsework - Mr Brookes K-Fit Ltd

    I expect that there will be very little distortion and all the images and text will be visible and clear. Test Ten - Loading in other browsers I am seeing that my website works in a range of different internet browsers I am going to load the index.html page in

  1. Future Developments in ICT

    Samsung have just showcased a prototype of such technology with peak transmission speeds of 1Gbps, faster than most (if not all) wire based solutions in use today for networking. According to Samsung the technology will allow you to download a full-length movie over the air in less than a second.

  2. Small Office Network Implementation - hardware and security.

    Network printer Jump to: navigation, search Link - http://www.woot.com/Images/Sale/-09Dell_1710N_Laser_Network_PrinterLLW-detail.jpg Network printers, have built-in network interfaces (typically wireless or Ethernet), and can serve as a hardcopy device for any user on the network. Individual printers are often designed to support both local and network connected users at the same time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work