Computer Security Essay

1413 words - 6 pages

The term cybercrime became often term being heard by people nowadays. In the early world, it was not a big deal and still can be controlled. Unfortunately, when there is a tremendous increasing number of connected people and devices, it is a bigger risk there to be resolved. A rough definition for the term cybercrime is a crime which is influenced by some kind of computer or cyber aspect. To be more specific, it is a crime that has illegal activities through it by using computers or network or hardware devices as its primary medium for some commissions. The commissions depend on how huge the illegal activities are. There are lots of cases that the performers of the cybercrime gained millions ...view middle of the document...

To add the spiciness of this issue, currently, cybercrime becomes the FBI’s top three priorities. We are all know what kind of cases that FBI handles in their everyday operation. Pertaining to the highly concern cases by FBI, we can figure out how horrible the cybercrime is.
Methods of conducting cybercrime by the cybercriminals are vary in ways. It relies on their actual goals and their skills as well. Theft of personal data, frauds, cyber bully, child pornography and the copyright infringement are those possible ways of the cybercrime could take cast. As we could see now, cybercrime may attack us in various approaches since it covers a wide range of distinct aggressions. Those invasions are well deserved their own unique accession when we think of protecting ourselves and improving our computers safety level. As stated earlier, when the criminals want to carry out their illegal activities, they need a medium to accomplish their illicit tasks. Therefore, the computers or devices will be the crime agent, the facilitator of the atrocity or maybe the point of the crime. Cybercriminals may need only one computer to place the crime or in addition to the other specific locations.
Since the cybercrime covers a huge range, it could be better adapted by breaking it into two types. Let’s just labeled them as type A and type B. Type A commonly describes as an individual event from the victim’s perspective. As an example, when there is a person who unconsciously downloads any kind of virus which the particular person installs a keystroke logger on his or her device. The keystroke logger then avows the hacker to abduct the personal information of a person that strictly needs to keep private for safety precaution such as the email password and the internet banking password. Besides that, phishing is another usual form of type A cybercrime. Phishing is a situation where the victim accepts or receives allegedly an appropriate email (normally claimed to be a bank or credit card company since this allegation is quite often being used) that comes along with a link that will be led to a hostile website. Right after the victim clicked the link, virus will infect the PC. Unprotected victims computer is one of the reasons why the hackers repeatedly execute the type A cybercrime with the cooperation of the bugs in the web browser. Other examples of type A cybercrime include identity theft and bank or e-commerce fraud.
Type B cybercrime is the worse compared to the type A or probably we should describe it as the worst cybercrime ever. It tends to be much more scary and combines dreadful things such as stock market manipulation, child predation, extortion, cyber stalking and harassment, blackmail, complex corporate espionage, child predation, and even planning or carrying out terrorist activities to crippling a country. It is identified as an on-going sequence of affair that involves often communication with the target. For an example, a relationship that...

Other Papers Like Computer Security

Computer Security Assessment Essay

567 words - 3 pages . Since the cases are highly sensitive, more secured identification processes are needed. Computer crimes are Hi-Tech crimes. Because there is a large increase in the number of offenders committing this crime, so it is necessary by an officer will be able to use multiple identities, using digital identity. On the other hand, full proof security is ensured by biological identity because it provides secure access. The role of signed X.509

Home Computer Security Essay

3757 words - 16 pages Home Computer Security -- Glossary Note: This is an historic document. We are no longer maintaining the content, but it may have value for research purposes. Pages linked to from the document may no longer be available.Home Computer Security       Glossary | This section contains definitions of terms used throughout this booklet. Unless otherwise stated, the definitions come from the Webopedia Online Dictionary for Computer and Internet

Computer Laboratory Security System

3875 words - 16 pages 1.0 INTRODUCTION Computer laboratory Security System is a wonderful management solution for Computer Laboratory includes all the necessary tools to keep your business organized and functioning properly. The application features a nice and very intuitive user interface which can be operated by anyone since it doesn't require any special knowledge. This system can be applied to different computer laboratory and computer cafes. It allows you

Computer System Security

3291 words - 14 pages Certification (GIAC). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Security Certified Program (SCP) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . CompTIA’s Security+ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certified Computer Examiner (CCE

Computer Data Security

838 words - 4 pages Every business from the small auto shop in our neighborhood to a big national corporations are worried about the same thing, keeping sensitive data safe, either by storing the physical paper work in a secure room or by strengthening computer security measures. Data needs to be handling with care and monitored all the time to make sure that the integrity of files has not been corrupted. Plus, data collected and stored in serves needs to be

Threats to Elements of Computer Security

1748 words - 7 pages Running Head: THREATS TO ELEMENTS OF COMPUTER SECURITY Threats To Elements Of Computer Security: Ways Employee Use of Emails May Breach Confidentiality, Integrity And Availability of Information. Gertrude Nyandat Grantham University Abstract Email has indeed become the primary communications medium for most organizations, While email is critical to the operation of almost all organizations, it is also

Course Discription

968 words - 4 pages Stallings, W., & Brown, L. (2008). Computer security principles and practice. Pearson Education, Inc. Software Microsoft® Project 2010 (Virtual Desktop) Microsoft® Visio® 2010 (Virtual Desktop) Microsoft® Excel® 2010 (Virtual Desktop) Microsoft® Word 2010 (Virtual Desktop) All electronic materials are available on the student website. Supplemental Resource Microsoft. (2012). Microsoft Office Project 2010. Hoboken, NJ

Introduction to Information Security Student

1249 words - 5 pages IT414 - Principles of Information Security Sherwin R. Pineda Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. Learning Outcomes 嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security Introduction 嗗The History of Information

Data And Privacy

2289 words - 10 pages Data Privacy and Security Table of Contents Introduction 3 Why Protection 4 Computer Virus 4 How Viruses Infect Computer 5 How People Hack Computer Systems 6 How to Keep Computers Safe from Online Predators 7 Conclusion 10 REFERENCES 11 Introduction The role of computer systems is very vital in our daily lives. Since computers help us to deal with approximately all the

Principles of Security 5th Edition Chapter 1 Review Questions

844 words - 4 pages security was dominant in the early years of computing? Physical security. 5. What are the three components of the C.I.A. triangle? What are they used for? Confidentiality, Integrity and availability are the three components of the C.I.A triangle. They are used as a standard for computer security. 6. If the C.I.A. triangle is incomplete, why is it so commonly used in security? The C.I.A triangle provides a basic standard of what is needed

Chapter 1-Introduction to Information Security: Principles of Information Security

979 words - 4 pages available to those authorized to use it. 6. If the CIA triangle is incomplete, why is it so commonly used in security? The CIA triangle is still used because it addresses the major concerns with the vulnerability of information systems. 7. Describe the critical characteristics of information. How are they used in the study of computer security? Availability: Authorized users can access the information Accuracy: free from errors

Related Essays

Computer Security Essay

1963 words - 8 pages Computer Security Victoria M. Deardorff Brevard Community College April 10, 2012 This paper is written as a basic overview of computer security for the non-technical user. This paper is meant to educate the reader on practical steps that can be implemented to secure their home-based computers. Additionally, the reader will be informed of industry and government needs for and methods of computer security. With this information, the reader

Computer Security Essay

915 words - 4 pages Contents 1.1) Computer threats categories 2 This attack covers: 2 2.) Bob signs up for internet banking. 3 2.1) how the security scheme works 3 2.2) is it secure against dongle theft 3 2.3) if safe from eavesdropping, does this eliminate need for dongle 3 2.4) the cryptographic primitives used 3 2.5) purpose of the serial number 3 2.6) does the serial number need to be randomly generated 3 Computer security and protecting our systems 4

What Is Computer Security? Essay

286 words - 2 pages Computer security (Also known as cybersecurity or IT Security) is information security as applied to computers and networks. The field covers all the processes and mechanisms by which computer-based equipment, information and services are protected from unintended or unauthorized access, change or destruction. Computer security also includes protection from unplanned events and natural disasters. One way to think of computer security is to

Computer Security In Education Essay

330 words - 2 pages are much more equipped to defend themselves. References Oblinger, D. (2003). IT Security and Academic Values. In Computer and network security in higher education (chapter one). Retrieved from Rasmussen, R. (2011, April 28). The college cyber security tightrope: Higher education institutions face greater risks. Retrieved from