Computer Crime and Software Sabotage: Risks and Prevention
Classified in Technology
Written at on English with a size of 4.87 KB.
Computer Crime
Any illegal or unauthorized behavior in connection with computers and computer networks. Examples of computer crime include:
- Computer sabotage
- Unauthorized access
- Computer forgery
- Damage to computer data or programs
- Computer fraud
- Computer espionage
- Unauthorized use of a computer
- Unauthorized use of a protected computer program
- Hacking
Software Sabotage
Viruses and other invaders. Also sabotage of hardware or software. Modern computers saboteurs commonly use software. The name given to the saboteurs destructive programs are: Viruses, Worms and Trojan horses. They mimic the behavior of living organisms.
Trojan Horse
Is a program that performs a useful task while at the same time carrying out some secret destructive act. Software hides an enemy in an attractive package. Trojan horses are often posted on programs on the web sites with names that make them sound like games or utilities. When an unsuspected person downloads and runs such a program, it might erase files, change data or cause other damage.
Logic Bomb
Is programmed to attack in response to a particular logical event or sequence of events. Time bomb: When the logic bomb is activated by a time-related event.
Viruses
A software virus spreads from program to program, or from disk to disk and uses infected programs or disk to make more copies of itself. Passes from computer to computer by producing copies of itself. Virus software is usually hidden in the operating system of a computer or in application programs. A virus is usually operating system specific. There are exceptions: Macro viruses attach themselves to documents that contain macros (Microsoft office). Email viruses they spread through emails, ex: Melissa, I love you and Chernobyl.
Worms
Like viruses worms use computer host to reproduce themselves. But unlike viruses, worms programs travel independently over computer networks, seeking out uninfected workstations to occupy. A typical worm resides in a workstation’s memory rather than on disk, so the worm can be eliminated by shutting down all of the workstations of the network.
Key Loggers
A key logger is a type of surveillance software that has the capability to record every keystroke you make to a log file. A key logger recorder can record: instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the key logger can then be sent to a specified receiver.
Spam
Spam is electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email.
Phishing
Is the act of sending an e-mail to a user falsely claiming to be an established legitimate business in an attempt to cheat the user into giving private information that will be used for malicious purposes. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is faked and set up only to steal the user’s information.
Virus Wars
Antivirus programs are designed to search for viruses, notify users when they are found and remove them from infected disks or files. You must update your antivirus program.
Computer Security Reducing Risks
With computer crime on the rise computer security has become an important concern for systems administrators and computer users.
Physical Access Restrictions
One way to reduce the risk of security breaks, is to make sure that the only authorized personnel have access to computer equipment. Something you have: a key, an ID card with a photo, a smart card containing digitally encoded ID in a built-in memory chip. Something you know: a password, an ID number a piece of personal history. Something you do: your signature, your typing speed, an error pattern. Something about you; a voice print, fingerprint, retina scan, facial feature scan or other individual body characteristic, they are called BIOMETRICS. Many systems use a combination of controls.
Passwords
Are the most common tool used to restrict access to computer systems.
Firewalls
A firewall is a gateway with a lock; the locked gate is opened only for information that pass one or more security inspections. Organizations use firewalls to keep their internal network secure while allowing communication with the rest of the internet. They are designed to serve at the same function to guard against unauthorized access to an internal network.
Protect Yourself Against Viruses
Run secure OS or use virus protection software. Never run macros unless you know their source. Never run executable attachments. Show extensions. Backup.