.

Saturday, June 1, 2019

Computer Fraud And Crimes :: essays research papers fc

Computer Fraud and CrimesIn the world of data processors, calculator fraud and computer crime are very prevalentissues facing every computer user. This ranges from system administrators topersonal computer users who do work in the office or at home. Computers withoutany means of security are vulnerable to attacks from viruses, worms, and culpablecomputer hackers. If the proper steps are not taken, safe computing may becomea thing of the past. Many security measures are macrocosm implemented to protectagainst amerciableities.Companies are becoming more(prenominal) aware and threatened by the fact that theircomputers are prone to attack. Virus scanners are becoming necessities on allmachines. Installing and monitoring these virus scanners takes many man hoursand a lot of money for site licenses. Many server programs are coming fitwith a program called "netlog." This is a program that monitors the computer useof the employees in a company on the network. The program moni tors memory andfile usage. A serve system administrator should be able to tell by theamounts of memory beingness used and the file usage if something is going on thatshould not be. If a virus is found, system administrators can pinpoint the userwho put the virus into the network and investigate whether or not there was anymalice intended. superstar computer application that is becoming more widely used and, therefore, morewidely abused, is the use of electronic mail or email. In the present day,illegal hackers can read email going through a server fairly easily. Emailconsists of not only personal transactions, but business and fiscaltransactions. There are not many encryption procedures out for email yet. AsGates describes, soon email encryption will become a regular addition to emailjust as a hard disk drive has become a regular addition to a computer (Gatesp.97-98).Encrypting email can be done with two prime numbers used as keys. The cosmoskey will be listed on the mesh or in an email message. The second key willbe private, which only the user will have. The sender will encrypt the messagewith the public key, send it to the recipient, who will then decipher it againwith his or her private key. This method is not foolproof, but it is not easy tounlock either. The numbers being used will probably be over 60 digits in length(Gates p.98-99).The Internet also poses more problems to users. This problem faces the homeuser more than the business user. When a person logs onto the Internet, he orshe may download a file corrupted with a virus.

No comments:

Post a Comment