Friday, June 14, 2019
Cybercrime Prevention Guide Essay Example | Topics and Well Written Essays - 1500 words
Cybercrime Prevention Guide - Essay ExampleThus, any unlawful activity where a computer is used as a tool or a target or both comes under the definition of the cyber crime. Cyber Crimes can be categorised in the followings, according to Potts (2002) A crime where a computer or different computers are targeted over the network, for example, spreading of viruses etc. The computer may excessively be used to commit the traditional crimes, as widely used and easy access for example, illegal gambling, money frauds etc. The computer may as well be used as a file cabinet to store illegal information. For instance, drug trafficker using the computer to store the data of his sources, store etc. There seems to be not much between conventional crimes and the cyber crimes, but still if we dig deep then as per the above mentioned definitions a cyber crime is any crime where the computer is used. Laws are introduced and enforced in most of the countries to counter the cyber crime because on t hat point used to be a m when this was not unlawful as per the laws of most the countries and provisions are being made in order to cater this. With the growth in computer technology, sore ways are being devised by the criminals in order to perform the illegal activities the same is being done in order to cater against these (Brenner, 2010). ... cypher induced into the software of an application or the operating system of an organization that is triggered on a specific time period or by almost triggering action of it. The nature of Logic Bombs is basically malicious, and they act same as a virus or a Trojan horse when activated by the triggering action. All those viruses that are to be released at some triggering action also fall into the category of a logic bomb (Parsons, Oja and Low, 1999). An organization applications and database are forever vulnerable to such attacks. As the data represent the most critical factor for any organization, most of the applications that are bei ng used are there to perform the operations and keep the data in an organized manner (Venkatraman, 2003). When such an attack is ingrained on data, nobody knows to what extent it may reproach the organization because such an attack may not only destroy the data on the hard disks of the individual user, but may be planted to destroy the data kept in the servers. It may be planted to cover some financial frauds by some individual or a group of individuals, because when records are destroyed, they cannot be held responsible for anything. It may be planted on the application program by some cranky that runs the mathematical production unit. That may change the recipe, and the mixing of the raw materials to generate the final project that is also financially not suitable for the organization. It will clearly mean that the end product made by this is a waste and it will hit the company badly because it will increase the wasted products amount (Brenner, 2010). Signs of Logic Bomb round off Parsons, Oja and Low (1999) mentioned in their book that sometimes it is very easy to detect a logic bomb attack, especially if it is a virus attack on the network of an
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.