Essay/Term paper: Computer fraud and crimes
Essay, term paper, research paper: Information Technology
Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Information Technology: Computer Fraud And Crimes, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.
Computer Fraud and Crimes
In the world of computers, computer fraud and computer crime are very prevalent
issues facing every computer user. This ranges from system administrators to
personal computer users who do work in the office or at home. Computers without
any means of security are vulnerable to attacks from viruses, worms, and illegal
computer hackers. If the proper steps are not taken, safe computing may become
a thing of the past. Many security measures are being implemented to protect
against illegalities.
Companies are becoming more aware and threatened by the fact that their
computers are prone to attack. Virus scanners are becoming necessities on all
machines. Installing and monitoring these virus scanners takes many man hours
and a lot of money for site licenses. Many server programs are coming equipped
with a program called "netlog." This is a program that monitors the computer use
of the employees in a company on the network. The program monitors memory and
file usage. A qualified system administrator should be able to tell by the
amounts of memory being used and the file usage if something is going on that
should not be. If a virus is found, system administrators can pinpoint the user
who put the virus into the network and investigate whether or not there was any
malice intended.
One computer application that is becoming more widely used and, therefore, more
widely abused, is the use of electronic mail or email. In the present day,
illegal hackers can read email going through a server fairly easily. Email
consists of not only personal transactions, but business and financial
transactions. There are not many encryption procedures out for email yet. As
Gates describes, soon email encryption will become a regular addition to email
just as a hard disk drive has become a regular addition to a computer (Gates
p.97-98).
Encrypting email can be done with two prime numbers used as keys. The public
key will be listed on the Internet or in an email message. The second key will
be private, which only the user will have. The sender will encrypt the message
with the public key, send it to the recipient, who will then decipher it again
with his or her private key. This method is not foolproof, but it is not easy to
unlock either. The numbers being used will probably be over 60 digits in length
(Gates p.98-99).
The Internet also poses more problems to users. This problem faces the home
user more than the business user. When a person logs onto the Internet, he or
she may download a file corrupted with a virus. When he or she executes that
program, the virus is released into the system. When a person uses the World
Wide Web(WWW), he or she is downloading files into his or her Internet browser
without even knowing it. Whenever a web page is visited, an image of that page
is downloaded and stored in the cache of the browser. This image is used for
faster retrieval of that specific web page. Instead of having to constantly
download a page, the browser automatically reverts to the cache to open the
image of that page. Most people do not know about this, but this is an example
of how to get a virus in a machine without even knowing it.
Every time a person accesses the Internet, he or she is not only accessing the
host computer, but the many computers that connect the host and the user. When
a person transmits credit card information, it goes over many computers before
it reaches its destination. An illegal hacker can set up one of the connecting
computers to copy the credit card information as it passes through the computer.
This is how credit card fraud is committed with the help of the Internet. What
companies such as Maxis and Sierra are doing are making secure sites. These
sites have the capabilities to receive credit card information securely. This
means the consumer can purchase goods by credit card over the Internet without
worrying that the credit card number will be seen by unauthorized people.
System administrators have three major weapons against computer crime. The
first defense against computer crime is system security. This is the many
layers systems have against attacks. When data comes into a system, it is
scanned for viruses and safety. Whenever it passes one of these security layers,
it is scanned again. The second resistance against viruses and corruption is
computer law. This defines what is illegal in the computer world. In the early
1980's, prosecutors had problems trying suspect in computer crimes because there
was no definition of illegal activity. The third defense is the teaching of
computer ethics. This will hopefully defer people from becoming illegal hackers
in the first place (Bitter p. 433). There are other ways companies can protect
against computer fraud than in the computer and system itself. One way to
curtail computer fraud is in the interview process and training procedures. If
it is made clear to the new employee that honesty is valued in the company, the
employee might think twice about committing a crime against the company.
Background checks and fingerprinting are also good ways to protect against
computer fraud.
Computer crime prevention has become a major issue in the computer world. The
lack of knowledge of these crimes and how they are committed is a factor as to
why computer crime is so prevalent. What must be realized is that the "weakest
link in any system is the human" (Hafner and Markoff p. 61). With the
knowledge and application of the preventative methods discussed, computer crime
may actually become an issue of the past.
Works Cited
Bitter, Gary G., ed. The MacMillian Encyclopedia of Computers. MacMillian
Publishing Company: New York, 1992.
Gates, William. The Road Ahead. New York : Penguin Books, 1995.
Hafner, Katie & John Markoff. Cyberpunk. New York : Simon and Schuster, 1991.
Romney, Marshall. "Computer Fraud – What Can Be Done About It?" CPA Journal
Vol. 65 (May 1995): p. 30-33.