Sunday, March 24, 2019

Computer Fraud And Crimes :: essays research papers fc

Computer Fraud and CrimesIn the world of computing machines, computer fraud and computer crime are very prevalentissues facing every computer substance ab exploiter. This ranges from system administrators topersonal computer users who do work in the billet or at home. Computers withoutany means of credential are compromising to attacks from computer viruses, worms, and illegalcomputer hackers. If the proper steps are not taken, serious computing whitethorn becomea thing of the past. umpteen security measures are existence implemented to protectagainst illegalities.Companies are becoming more than(prenominal) aware and threatened by the fact that theircomputers are prone to attack. virus scanners are becoming necessities on allmachines. Installing and monitoring these virus scanners takes many man hoursand a lot of money for site licenses. Many server programs are coming equippedwith a program called "netlog." This is a program that monitors the computer useof th e employees in a company on the communicate. The program monitors memory andfile usage. A qualified system administrator should be able to tell by theamounts of memory being apply and the file usage if something is going on thatshould not be. If a virus is found, system administrators can pinpoint the userwho put the virus into the network and investigate whether or not there was anymalice intended. integrity computer application that is becoming more widely used and, therefore, morewidely abused, is the use of electronic mail or email. In the express day,illegal hackers can read email going through a server fairly easily. Emailconsists of not only personal transactions, barely business and financialtransactions. There are not many encryption procedures out for email yet. AsGates describes, soon email encryption will become a regular addition to email simply as a hard disk drive has become a regular addition to a computer (Gatesp.97-98).Encrypting email can be done with two prim e numbers used as keys. The human beingskey will be listed on the Internet or in an email message. The second key willbe private, which only the user will have. The engineerer will encrypt the messagewith the public key, send it to the recipient, who will then decipher it againwith his or her private key. This system is not foolproof, but it is not easy tounlock either. The numbers being used will probably be over 60 digits in length(Gates p.98-99).The Internet also poses more problems to users. This problem faces the homeuser more than the business user. When a person logs onto the Internet, he orshe may download a file corrupted with a virus.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.