.

Wednesday, February 13, 2019

Computer Fraud And Crimes :: essays research papers fc

Computer Fraud and CrimesIn the man of figurers, computer fraud and computer crime argon very publicissues facing every computer drug user. This ranges from system administrators to someoneal computer users who do work in the office or at home. Computers withoutany path of security are vulnerable to attacks from viruses, worms, and illegalcomputer hackers. If the proper steps are non taken, safe computing may becomea thing of the past. Many security measures are being implemented to encourageonce to a greater extentst illegalities.Companies are becoming more(prenominal) aware and threatened by the event that theircomputers are prone to attack. Virus scanners are becoming necessities on eithermachines. Installing and monitoring these virus scanners takes many man hoursand a nap of money for site licenses. Many server programs are coming fit outwith a program called "netlog." This is a program that monitors the computer useof the employees in a company on the netwo rk. The program monitors memory andfile usage. A qualified system administrator should be able to tell by theamounts of memory being used and the file usage if something is going on thatshould not be. If a virus is found, system administrators can pinpoint the userwho put the virus into the network and investigate whether or not at that place was anymalice intended.One computer application that is becoming more widely used and, therefore, morewidely abused, is the use of electronic beam or netmail. In the present day,illegal hackers can read email going through a server fairly easily. Emailconsists of not only personal transactions, but business and financialtransactions. There are not many recruition procedures out for email yet. As render describes, soon email encryption entrust become a tied(p) addition to emailjust as a hard disk drive has become a regular addition to a computer (Gatesp.97-98).Encrypting email can be done with two prime numbers pool used as keys. The pub lickey will be listed on the Internet or in an email message. The second key willbe private, which only the user will have. The sender will encrypt the messagewith the public key, send it to the recipient, who will then decipher it againwith his or her private key. This method is not foolproof, but it is not open tounlock either. The numbers being used will probably be over 60 digits in length(Gates p.98-99).The Internet also poses more problems to users. This problem faces the homeuser more than the business user. When a person logs onto the Internet, he orshe may download a file crooked with a virus.

No comments:

Post a Comment