• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computer Crime, Security and Data Protection.

Extracts from this document...


Computer Crime, Security and Data Protection Information Technology is a key component it the maintenance of our modern society. It is improving all the time, and in turn creates new opportunities. However, with the extent of criminals and fraud ICT is exploited. As information technology has spread, so too have computer crime and abuse. This is what this report will look at in great detail, and defines what Computer crime is and how it refers to the law. In this report I am going to cover the following areas on computer crime: * Computer crime and abuse * Computer crime and the law * Security threats to ICT systems * How to protect to ICT systems * Data Protection Legislation Computer Crime, abuse and the law As new technologies increase it creates new opportunities for crime, this is what computer crime and abuse entails. However, Computer abuse refers acts that are legal but unethical. For example; the Internet exploits this by having a lenient policy that computer abusers can create or construct lawful but very unsuitable sites for the innocent public to view. Here are some higher and lower case example of computer abuse situations... ...read more.


Worms invade a computer and steal its resources to replicate themselves. They use networks to spread themselves. A Trojan horse appears to do one thing but does something else. The system may accept it as one thing, but upon execution it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like the computer clock reaching a certain date. It might release a virus or be a virus itself. No defence No one connected to a computer network is really safe from hackers. But remember most invasions or infections don't result in serious injury to the system that has been attacked. The only real defence is limiting your risk by using virus scanners and enforcing security measures on network computers. But in the end, hackers see security systems as a challenge, not an obstacle. Computer fraud and crime In the world of computers, computer fraud and computer crime are very serious issues facing every computer user. This ranges from system administrators to personal computer users who do work in the office or at home. Computers without any means of security are vulnerable to attacks from viruses, worms, and illegal computer hackers. ...read more.


Businesses lose three hundred million to about five billion dollars yearly due to these computer criminals; hackers or computer information thieves. Computer security has come a long way since the creation of computers. But still we cannot fully believe our computers are fully secure and safe from unwanted hackers. Computer security is very hard to create presently for anyone can get in if they know what to do. How to protect from Viruses Companies are becoming more aware and threatened by the fact that their computers are prone to attack. Virus scanners are becoming necessities on all machines. Installing and monitoring these virus scanners takes many hours and a lot of money for site licenses. Many server programs are coming equipped with a program called "netlog". This is a program that monitors the computer use of the employees in a company on the network. The program monitors memory and file usage. A qualified system administrator should be able to tell by the amounts of memory being used and the file usage if something is going on that should not be. If a virus is found, system administrators can pinpoint the user who put the virus into the network and investigate whether or not it was intended. Matthew Ainsworth 4/27/07 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    This works as both a deterrent; because warning potential burglars of alarms would prevent them from breaking in.

  2. Peer reviewed

    HCI shortened for Human Computer Interaction is the study of the human and computer ...

    3 star(s)

    Each action is assigned a time so it'll be able to calculate how system responds. o The throughput; Throughput (TP) simply relates to the productivity of the computer and the speed of processing in response to a command that is being made.

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Data is safe, secure and quick when it is transmitted between two computers. WAN can also be used to connect different types of networks together for example a WAN network connected to a LAN networks. The reason behind this is that it is AppleTalk.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    This will consist of: A description of their data, What it contains the purposes for which it is being processed, Why it is being processed people to whom it may be disclosed, Who is allowed to see it the name of the organisation that is actually carrying out the processing of their data.

  1. Different ways of data capture

    to evaluate the package *Software can be brought/Installed straight away *Software is tested and less likely to contain bugs like just written software *Software is usually well documented *Training maybe available in common software packages Advantages of tailor made/bespoke software: *Software is designed exactly to user requirements *Software can be

  2. I have been given the task to design a database for a company called ...

    in cm 1 1.5 25 12 5 2 15 100 60 40 3 35 120 70 50 4 20 190 30 20 5 15 5 5 6 0.4 15 5 3 Testing Customer 1's data Weight 1.5Kg is not the exact weight for the price categories.

  1. Free essay

    Setting up and E-Commerce Site

    �700+ dependant on what is chosen �100 We can see that in the table above we have given rough price guides to how much these items will cost in relation to our website that we will have for e-commerce. Firstly we need to think do we need to build the

  2. Future Developments in ICT

    Versus LTE, which tops out at around 75 megabits-per-second (Mbps). The prototype made use of 64 antennas, though with an estimated lead-time of 7 years on the project this number is bound to decrease. Consumers will not see such a solution until 2020 at the earliest, though System on Chip (SoC)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work