Computer Technology & New Google: Computer Crime

Thursday, April 28, 2016

Computer Crime

                                  Computer Crime









Computer crime is the illegal use of a computer by an unauthorized individual, either for pleasure such as by a computer hacker or for profit as by a thief. Thus, it refers to any crime such as tampering, physical danger and unwanted disclosure of data that involves a computer and a computer network. It includes the computer that may have been used in the commission of a crime, or it may be the target.
        The increasing range of programmable electronic devices, such as PDF, iPad , iPhone, mobile devices, means that ' computer '. Crime can affect more than just personal compilers (PCs) to all these devices, which are particularly vulnerable to at track because of flexibility. They can be reprogrammed and are frequently connected with other devices. For example , a personal computer connected to the Internet without protection may be infected with malicious software within a minute.
Generally, computer crimes are committed for the following:-

  i.   Attempt illegally to access  information stored on a computer as information may have a sale              value, may be valuable to the owner or may be useful for further illegal activity such as fraud.
 ii.  Try to impede or alter the functioning of the computer itself as if computer can be controlled it           can be used to send spam, host illegal content, or conduct further at tracks.

              Many countries have passed cyber laws. Many other rules and regulations are emerged for the protection of the computer and its related resources. The recent surveys done by different agencies and organization show that the rate of computer crime has been increasing day by day. A range of technologies is available to home user and organizations to secure their computer from possible computer crimes.

Technological solutions
If correctly installed, the following can be help to block attacks:

1) firewalls:
                       These are hardware or software devices that block certain network traffic according to their security policy.


2) software solution:
                         These are used to identify and remove malware and to help manage spam email. Many must be paid for but free versions are also available. For example, Antivirus , Anti spyware software.


3) Authentication:
                           This process involves determining that a particular user is authorized to used a particular computer. This can include simple mechanisms such as passwords, to more complex methods using bio metric technology.


4) Hardware Cryptography:
                              It uses computer chips with cryptography capabilities intended to protect against a range of security threats.


5) Patches:
                    These are programs designed by software manufactures to fix software participation and increases ease of use.

No comments:

Post a Comment