Computer crime encompasses unauthorized access, modification, and destruction of digital resources, as well as the unauthorized release and copying of information. Hacking involves the unauthorized use of computer systems, while crackers are criminal hackers who exploit vulnerabilities for personal gain. To combat these threats, companies implement various security measures, including antivirus software, security monitors, and biometric security, alongside backup systems to ensure data integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
8 views
Computer Crime
Computer crime encompasses unauthorized access, modification, and destruction of digital resources, as well as the unauthorized release and copying of information. Hacking involves the unauthorized use of computer systems, while crackers are criminal hackers who exploit vulnerabilities for personal gain. To combat these threats, companies implement various security measures, including antivirus software, security monitors, and biometric security, alongside backup systems to ensure data integrity.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20
Computer Crime
Computer Crime Computer crime is defined by the Association of Information Technology professionals as including 1)the unauthorized use, access,
modification, and destruction of hardware,
software, data, or network resources; 2)the unauthorized release of information: Computer Crime 3)the unauthorized of copying of software: 4)denying an end user access to his or her
own hardware, software, data, or network
resources. Hacking Hacking, in computerize, is the obsessive use of computers, or the unauthorized access and use of networked computers systems. Hackers can be outsiders or company
employees who use the internet and other
networks to damage data and programs. Hacking One of the issues in hacking is what to do about a hacker who commits only electronic breaking and entering; that is, get access to a computer system, reads some files, but neither steals nor damages anything. Hacking Hackers can also monitor e-mail, Web server access, or file transfers to extract passwords or steal network files. Cracker A cracker also called a black hat or darkside hacker is a criminal hacker. This term is used outside of the security industry and by some modern programmers. Usually a cracker is a person who maintains knowledge of the vulnerabilities and exploits he or she finds as secret for private advantage, not revealing them either to the general public or to the manufacturer for correction. Virus Defenses Many companies are building defenses against the spread of viruses by centralizing the distribution and updating of antivirus software As a responsibility of there is departments. Virus Defenses Other companies are outsourcing the virus protection responsibility to their Internet service providers or to telecommunications or security management companies Antivirus Software Companies Major antivirus software companies like Trend Micro ( eDoctor a), McAfee ( PC- cillin ), McAfee (Virus Scan), and Symantec (Norton Antivirus) have developed network versions of their programs, which they are marketing to ISPs and others as a service they should offer to all their customers. Other Security Measures A variety of security measures that are commonly used to protect business systems and networks. These include both hardware and software
tools like fault tolerant computers and
security monitors, and security policies and procedures like passwords and backup files. Security Codes Multilevel password system is used for security management . First, an end user logs into the computer
system by entering his or her unique
identification code, or user ID. The end user is then asked to enter a
password in order to gain access into the
systems. Next, to access an individual file, a unique file name must be entered. In some systems, the password to read the
contents of a file is different from that
required to write to a file(change it’s contents). This feature adds another level of
protections to store data resources.
BACKUP FILES Backup files, which are duplicate files of data or programs, are another important security measure. File can also be protected by file retention measures that involve storing copies of files from previous periods. If currents files are destroyed, the files from
previous periods can be used to reconstruct
new current files. SECURITY MONITERS. Systems security monitors are programs that monitors the use of computer systems and networks and protect them unauthorized use, fraud, and destruction. Such programs provide the security measures needed to allow only authorized users to access the networks. Security monitors also control the use of the hardware, software, and data resources of a computer systems. BIOMETRIC SECURITY Is a fast-growing area of computer security. These are security measures provided by
computer devices that measures physical
traits that make each individual unique. This include voice verification, fingerprints,
hand geometry, signature dynamics,
keystroke analysis, face recognition. COMPUTER FAILURE CONTROLS Computer systems fail for several reasons – power failures , electronics circuitry malfunctions, telecommunications network problems, hidden programming errors, computer viruses, computer operator errors. Major hardware or software changes are usually carefully scheduled and implemented to avoid problems. Finally, highly trained data center personnel and the use of performance and security management software help keep a company’s computer systems and networks working properly. FAULT TOLERANT SYSTEMS Many firms also use fault tolerant computer systems that have redundant processors, and software that provide a fail- over capability to back components in the event of system failure. This may provide a fail- safe capability, where the computer systems continues to operate at the same level even if there is a major hardware or software failure.