Computer Crime, Security and Data Protection.

Authors Avatar
Computer Crime, Security and Data Protection

Information Technology is a key component it the maintenance of our modern society. It is improving all the time, and in turn creates new opportunities. However, with the extent of criminals and fraud ICT is exploited. As information technology has spread, so too have computer crime and abuse. This is what this report will look at in great detail, and defines what Computer crime is and how it refers to the law. In this report I am going to cover the following areas on computer crime:

* Computer crime and abuse

* Computer crime and the law

* Security threats to ICT systems

* How to protect to ICT systems

* Data Protection Legislation

Computer Crime, abuse and the law

As new technologies increase it creates new opportunities for crime, this is what computer crime and abuse entails. However, Computer abuse refers acts that are legal but unethical. For example; the Internet exploits this by having a lenient policy that computer abusers can create or construct lawful but very unsuitable sites for the innocent public to view. Here are some higher and lower case example of computer abuse situations...

Lower Case Situations

Higher Case Situations

Employees using their work time to exploit the use of a computer/Internet, which is not related to work.

Computer Criminals exploiting the use of credit card detail for improper use. (Thief of money)

Computer abuses creating unethical Websites, which are not really suitable to view.

Companies exploit the use for customer data. Such as asking for personal, criminal records which are not related to the company.

Hackers causing grief in Internet chat rooms, by hacking into the system to take control of the room.

Hackers accessing information with no legal, or authorised permission.

Most if not all of these situations are very common in today's modern society. In more serious computer crime situations computers are used to track reservations for the airline industry, process billions of pounds for banks, manufacture products for industry, and conduct major transactions for businesses because more and more people now have computers at home and at the office. People can commit computer crimes because of society's declining ethical standards.

Hacking

Hacking is, by definition accessing unauthorised data held on a computer system. There is a common misconception among the general public about what makes a hacker and what hacking is. Hacking can also be defined as "gaining illegal entry into a computer system, with the intent to alter, steal, or destroy data." Hackers come in many varieties. The term hacker usually brings to mind three of these...
Join now!


* People who break the security of computer networks

* People who break the security on application software

* People who create malicious programs like viruses

This is a simple way to divide the activities that fall under "hacking". I will now summarise each of these types of hackers and discuss other areas linked to the issue - Hacking.

Network hackers

These are the hackers you see in movies, real hackers don't fit those stereotypes. They aren't nerds living in darkened dorm rooms or multi-millionaire industrial spies. They are average people with ...

This is a preview of the whole essay