Computer Crime
The increasing range of programmable electronic devices, such as PDF, iPad , iPhone, mobile devices, means that ' computer '. Crime can affect more than just personal compilers (PCs) to all these devices, which are particularly vulnerable to at track because of flexibility. They can be reprogrammed and are frequently connected with other devices. For example , a personal computer connected to the Internet without protection may be infected with malicious software within a minute.
Generally, computer crimes are committed for the following:-
i. Attempt illegally to access information stored on a computer as information may have a sale value, may be valuable to the owner or may be useful for further illegal activity such as fraud.
ii. Try to impede or alter the functioning of the computer itself as if computer can be controlled it can be used to send spam, host illegal content, or conduct further at tracks.
Many countries have passed cyber laws. Many other rules and regulations are emerged for the protection of the computer and its related resources. The recent surveys done by different agencies and organization show that the rate of computer crime has been increasing day by day. A range of technologies is available to home user and organizations to secure their computer from possible computer crimes.
Technological solutions
If correctly installed, the following can be help to block attacks:
If correctly installed, the following can be help to block attacks:
1) firewalls:
These are hardware or software devices that block certain network traffic according to their security policy.
These are hardware or software devices that block certain network traffic according to their security policy.
2) software solution:
These are used to identify and remove malware and to help manage spam email. Many must be paid for but free versions are also available. For example, Antivirus , Anti spyware software.
These are used to identify and remove malware and to help manage spam email. Many must be paid for but free versions are also available. For example, Antivirus , Anti spyware software.
3) Authentication:
This process involves determining that a particular user is authorized to used a particular computer. This can include simple mechanisms such as passwords, to more complex methods using bio metric technology.
This process involves determining that a particular user is authorized to used a particular computer. This can include simple mechanisms such as passwords, to more complex methods using bio metric technology.
4) Hardware Cryptography:
It uses computer chips with cryptography capabilities intended to protect against a range of security threats.
It uses computer chips with cryptography capabilities intended to protect against a range of security threats.
5) Patches:
These are programs designed by software manufactures to fix software participation and increases ease of use.
These are programs designed by software manufactures to fix software participation and increases ease of use.
No comments:
Post a Comment