0% found this document useful (0 votes)
8 views

Computer Crime

Computer crime encompasses unauthorized access, modification, and destruction of digital resources, as well as the unauthorized release and copying of information. Hacking involves the unauthorized use of computer systems, while crackers are criminal hackers who exploit vulnerabilities for personal gain. To combat these threats, companies implement various security measures, including antivirus software, security monitors, and biometric security, alongside backup systems to ensure data integrity.

Uploaded by

usman.upwork99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Computer Crime

Computer crime encompasses unauthorized access, modification, and destruction of digital resources, as well as the unauthorized release and copying of information. Hacking involves the unauthorized use of computer systems, while crackers are criminal hackers who exploit vulnerabilities for personal gain. To combat these threats, companies implement various security measures, including antivirus software, security monitors, and biometric security, alongside backup systems to ensure data integrity.

Uploaded by

usman.upwork99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

Computer Crime

Computer Crime
 Computer crime is defined by the
Association of Information Technology
professionals as including
 1)the unauthorized use, access,

modification, and destruction of hardware,


software, data, or network resources;
 2)the unauthorized release of information:
Computer Crime
 3)the unauthorized of copying of software:
 4)denying an end user access to his or her

own hardware, software, data, or network


resources.
Hacking
 Hacking, in computerize, is the obsessive
use of computers, or the unauthorized
access and use of networked computers
systems.
 Hackers can be outsiders or company

employees who use the internet and other


networks to damage data and programs.
Hacking
 One of the issues in hacking is what to do
about a hacker who commits only electronic
breaking and entering; that is, get access to
a computer system, reads some files, but
neither steals nor damages anything.
Hacking
 Hackers can also monitor e-mail, Web
server access, or file transfers to extract
passwords or steal network files.
Cracker
 A cracker also called a black hat or darkside
hacker is a criminal hacker.
 This term is used outside of the security
industry and by some modern programmers.
 Usually a cracker is a person who maintains
knowledge of the vulnerabilities and exploits
he or she finds as secret for private
advantage, not revealing them either to the
general public or to the manufacturer for
correction.
Virus Defenses
 Many companies are building defenses
against the spread of viruses by centralizing
the distribution and updating of antivirus
software
 As a responsibility of there is departments.
Virus Defenses
 Other companies are outsourcing the virus
protection responsibility to their Internet
service providers or to telecommunications
or security management companies
Antivirus Software
Companies
 Major antivirus software companies like
Trend Micro ( eDoctor a), McAfee ( PC-
cillin ), McAfee (Virus Scan), and Symantec
(Norton Antivirus) have developed network
versions of their programs, which they are
marketing to ISPs and others as a service
they should offer to all their customers.
Other Security Measures
 A variety of security measures that are
commonly used to protect business systems
and networks.
 These include both hardware and software

tools like fault tolerant computers and


security monitors, and security policies and
procedures like passwords and backup files.
Security Codes
 Multilevel password system is used for
security management .
 First, an end user logs into the computer

system by entering his or her unique


identification code, or user ID.
 The end user is then asked to enter a

password in order to gain access into the


systems.
 Next, to access an individual file, a unique
file name must be entered.
 In some systems, the password to read the

contents of a file is different from that


required to write to a file(change it’s
contents).
 This feature adds another level of

protections to store data resources.


BACKUP FILES
 Backup files, which are duplicate files of
data or programs, are another important
security measure. File can also be protected
by file retention measures that involve
storing copies of files from previous periods.
 If currents files are destroyed, the files from

previous periods can be used to reconstruct


new current files.
SECURITY MONITERS.
 Systems security monitors are programs
that monitors the use of computer systems
and networks and protect them
unauthorized use, fraud, and destruction.
Such programs provide the security
measures needed to allow only authorized
users to access the networks.
 Security monitors also control the use of the
hardware, software, and data resources of a
computer systems.
BIOMETRIC SECURITY
 Is a fast-growing area of computer security.
 These are security measures provided by

computer devices that measures physical


traits that make each individual unique.
 This include voice verification, fingerprints,

hand geometry, signature dynamics,


keystroke analysis, face recognition.
COMPUTER FAILURE
CONTROLS
 Computer systems fail for several reasons –
power failures , electronics circuitry
malfunctions, telecommunications network
problems, hidden programming errors,
computer viruses, computer operator errors.
 Major hardware or software changes are
usually carefully scheduled and
implemented to avoid problems. Finally,
highly trained data center personnel and
the use of performance and security
management software help keep a
company’s computer systems and networks
working properly.
FAULT TOLERANT SYSTEMS
 Many firms also use fault tolerant
computer systems that have redundant
processors, and software that provide a fail-
over capability to back components in the
event of system failure. This may provide a
fail- safe capability, where the computer
systems continues to operate at the same
level even if there is a major hardware or
software failure.

You might also like