ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Security

Essay by   •  September 14, 2010  •  Essay  •  932 Words (4 Pages)  •  1,351 Views

Essay Preview: Security

Report this essay
Page 1 of 4

The use of computers within the business and government sector has said to have 'rapidly increased over the last fifteen years'; this therefore provides a whole new prospect for a distinctive criminal to prosper, and in most cases, to go utterly undiscovered. It has been anticipated that, unless this particular problem is tackled head on, losses from the computer crime may eventually reach $50 billion per year. One expert in the field has estimated that, under present law the chances of a computer criminal being convicted are 1 in 500, and of going to jail as 1 in 1000. The possibility of corporations or banks going bankrupt as a result of computer theft is very real. W. John Taggart, "Computer Law in Australia". There are many forms of computer abuse, yet they have come to many solutions. Many penalties if the criminals get caught and yet there are many weaknesses in computer law. With the expeditions rate of advances in technology, coping with those classified as 'computer criminals' who are always one step ahead, is virtually impossible. They may 'patch up' faults in previous systems, however do not recognise faults in latest systems until it's too late.

Computer crime involves the unauthorised and unlawful use of a computer. Given growth of technology in our society, the incidence of computer rime is a matter of considerable concern for our law-makers. The cost of computer crime in the United States has been estimated to be at least $5000 million a year. (Cudmor, Greg "Computer Law", page 8). Who would be classified as a 'computer criminal'? It is said that often the 'computer criminal' is a trusted employee and the problem for organisations seems to be internal security.

The community considers computer crime, as being less serious than other crimes against property, such as burglary or car theft, as it is not violent or public. In many instances computer crime is not always reported, due to the complexity of information systems. It is sometimes possible for offences to be concealed and often victims are unaware that an offence has even been committed.

A reason for computer crime not being reported is when the crime is discovered companies defrauded of tremendous sums of money are sometimes ashamed to report a breach of security. Another reason is that the offender is sometimes and employee of the company and if the harm is not significant the company may discipline or dismiss the offender. In this instance the offender may not have intended to steal money but rather punish the company because of perceived injustice.

Computer crime appears in a number of forms; malicious damage, unlawful trespass and use (theft of computer time), theft of information, unauthorised alteration of information, fraud by computer manipulation and pirating computer software, hacking and creating viruses to destroy information systems and hard drives. People are merely coping with the rate of technology, let alone the rate of computer criminology.

There are various methods used to help ensure that a database is secure such as; the assignment of passwords to users, the use of voice recognition, Id cards, the granting and revoking of authority for individuals to have access to various parts or views of a database, the encryption and decryption of particularly sensitive data, the monitoring

...

...

Download as:   txt (5.5 Kb)   pdf (80.5 Kb)   docx (10.7 Kb)  
Continue for 3 more pages »
Only available on ReviewEssays.com
Citation Generator

(2010, 09). Security. ReviewEssays.com. Retrieved 09, 2010, from https://www.reviewessays.com/essay/Security/2034.html

"Security" ReviewEssays.com. 09 2010. 2010. 09 2010 <https://www.reviewessays.com/essay/Security/2034.html>.

"Security." ReviewEssays.com. ReviewEssays.com, 09 2010. Web. 09 2010. <https://www.reviewessays.com/essay/Security/2034.html>.

"Security." ReviewEssays.com. 09, 2010. Accessed 09, 2010. https://www.reviewessays.com/essay/Security/2034.html.