We have collected more than 100 brand new call girls number and added it to a pdf for easy sharing.
To download 100+ Dhakaia Magi's number, complete the captcha and download it.

Download now

Loading Captcha...

If it doesn't load, please disable Adblock!

Computer Crime

Computer Crime
Computer crime refers to any crime that involves a computer may have been used in the commission of a crime, or it may be the target. Net rime   refers to criminal exploitation of the internet. Cybercrimes are defined as: “offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly using modern telecommunication networks such as internet rooms, email, notice boards and mobile phones.
Crimes that primarily target computer networks or devices include
Computer viruses
Denial of service attacks
Malware (malicious code)  
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft
Information ware fare
Phishing scams
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons.
·     Harassment

Where as content may be offensive in a non –specific way harassment  directs obscenities and derogatory comments at specific way individuals focusing for example on gender, race, religion, nationality, sexual orientation.

Drug traffickers are increasingly taking advantage of the internet to sell there illegal substances through encrypted email and other internet technology.
Controls for preventing and detecting computer crime 
It would be nice to assume that everyone associated with business is honest. A totally honest workforce would certainly eliminate the need for controls to prevent crime.

Controls that allow only authorized people access to sensitive systems include the following:
Passwords: Use passwords that are long enough to be difficult to guess passwords should not be composed of simple words, names of relatives and so on.
Compartmentalization: Restrict users to the specific files and programs they have a job related need to access
Use of biometrics: Use of fingerprints, iris recognition, hand geometry and other new technologies for added measures of control.
Use of one time passwords: Use hardware or software that generates a new password for each access.
Automatic log off: Use this measure to prevent unauthorized access to the system when authorized users fail to log off.
Time day controls: Restrict personnel access to those times when they are supposed to be on duty.
So, when people are more attentive or more knowledge about the bad side of computer crime then they are more attentive to keep their computer easily. Because the computer crime is most neglected in our society

An Assignment
Computer Crime

For the Course titled Bangladesh Studies Society and Culture
[Course Code: HSS111(a)]
Submitted to:
Ms Layeqa Bashir
Assistant Professor, Sociology
Department of Basic Sciences and Humanities
University of Asia Pacific
Submitted by:
Md. Mazedur  Rahman
Reg. no.12108126
Department of Electrical and Electronic Engeeneering
Spring 2012 Semester
Date of submission: 25-07-2012

No comments:

Post a Comment

Follow by Email



My photo

Anika Devi received her Bachelor’s degree in Media, Culture and Communication from New York University in 2012. She began freelancing for Business Solutions BD in 2010 and joined the team as a staff writer three years later. She currently serves as the assistant editor.
Worked well for Website DA, Entrepreneurship, Starting a Blog, Payoneer MasterCard, Sex Tips, Phone Sex, So how do you think? Want to get into her pants? Read here