Computer Crime
Computer crime refers
to any crime that involves a computer may have been used in the commission of a
crime, or it may be the target. Net rime
refers to criminal exploitation of the internet. Cybercrimes are defined
as: “offences that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm the reputation of the victim or
cause physical or mental harm to the victim directly or indirectly using modern
telecommunication networks such as internet rooms, email, notice boards and
mobile phones.
Crimes that primarily
target computer networks or devices include
Computer viruses
Denial of service
attacks
Malware (malicious
code)
Crimes that use
computer networks or devices to advance other ends include:
Fraud and identity
theft
Information ware fare
Phishing scams
The content of websites
and other electronic communications may be distasteful, obscene or offensive
for a variety of reasons.
· Harassment
Where as content may be offensive in a non –specific way harassment directs obscenities and derogatory comments at specific way individuals focusing for example on gender, race, religion, nationality, sexual orientation.
Drug traffickers are
increasingly taking advantage of the internet to sell there illegal substances
through encrypted email and other internet technology.
Controls for preventing and detecting computer
crime
It would be nice to
assume that everyone associated with business is honest. A totally honest
workforce would certainly eliminate the need for controls to prevent crime.
Controls that allow
only authorized people access to sensitive systems include the following:
Passwords: Use passwords that are
long enough to be difficult to guess passwords should not be composed of simple
words, names of relatives and so on.
Compartmentalization: Restrict users to the
specific files and programs they have a job related need to access
Use of biometrics: Use of fingerprints,
iris recognition, hand geometry and other new technologies for added measures
of control.
Use of one time passwords: Use hardware or software that generates a new password for each access.
Automatic log off: Use this measure to
prevent unauthorized access to the system when authorized users fail to log
off.
Time day controls: Restrict personnel
access to those times when they are supposed to be on duty.
So, when people are
more attentive or more knowledge about the bad side of computer crime then they
are more attentive to keep their computer easily. Because the computer crime is
most neglected in our society
An Assignment
on
Computer Crime
For the Course titled
Bangladesh Studies Society and Culture
[Course Code:
HSS111(a)]
Submitted to:
Ms Layeqa Bashir
Assistant Professor,
Sociology
Department of Basic
Sciences and Humanities
University of Asia
Pacific
Submitted by:
Md. Mazedur Rahman
Reg. no.12108126
Department of Electrical
and Electronic Engeeneering
Spring 2012 Semester
Date of submission:
25-07-2012
No comments:
Post a Comment