Friday, May 3, 2019
Computer-Based Crimes Research Paper Example | Topics and Well Written Essays - 1000 words
Computer-Based Crimes - Research Paper lessonIn this case, monetary reward is the goal of hacking. Some hackers whitethorn also hack into a estimator system with the aim of revenging. Such a hacker may steal and distribute bare-assed entropy that could hurt the business. During a hacking episode, a hacker may connect to a stern information processing system by an open network. For instance, open wireless connection offers hackers a quick way of attacking a computer system. Hackers go off also aim exploits to compromise a host and use it to gain access into the target computer. Once the hacker compromises the computer, they are may steal unprotected information from the computers. Phishing Computer-based crimes may also inculpate wrongful acquisition of data and information about substance abusers for the purpose of misrepresentation. Users who beat access to computer systems have various identities, which describe the users much(prenominal) s they address or bank details . There are times when criminal attempt to acquire date from users by false means. For instance, criminals could dupe users into providing their bank details to a website that appears to be genuine, but not (Onescu, Irea, & Blajan, 2011). With a successful phishing, the criminal may use the data from the user to commit crime or for financial gain much(prenominal) as acquire items online. Among the many computer-based crimes, phishing has the highest tally of occurrences. There are various ways of phishing users online. One common technique is the use of an email that may appear to be from legitimate from a legitimate source. Using such emails, the sender will impel the user to follow a link and perhaps fill some sensitive information into a form and upon clicking the submit button send the information to the user. A typical scenario will be a criminal sending an... This research paper not only describes most common ways that criminals use to steal your data or hack computer sys tem, but also provides recommendations on how to prevent such events and to increase user awareness of computer-related systems. Over year, the number of computer-based crimes has been rising and there are no signs the radiation diagram will change, at least for now. Computer crime refers to any criminal activity where criminals target a computer, or use computers to violate the law. In recent years, criminals have used computers to commit crime such as stealing credit cards from unsuspecting users. With the number of computer crimes growing, there is significant hobby on how users can enhance their safety when using computers. This essay describes many issues, that could affect the computer industriousness with computer-based crime and ethical issues being the chief. Using computers, criminals can commit crimes such as phishing where they capture sensitive user data and possibly misuse them. However, increasing user awareness and using antivirus software can help prevent and miti gate this threat. The researcher states that organizations can implement decision to curb ethical issues such as software piracy where employees copy and install software without purchasing them. Being that those firms deprives software vendors of revenues, purchasing the software and creating awareness is a fair strategy of reducing the practice. This solution align with fairness move up because it allows the developers to earn money while making software firms pay for tools they use to earn money.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.