Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Day 10

Computer crime
• Computer crime describes a very broad category of offenses. Some of them are the same as non-
computer offenses, such as larceny or fraud, except that a computer or the Internet is used in the
commission of the crime. Others, like hacking, are uniquely related to computers. Read on to find
out what kinds of activities are considered computer crimes and how to protect yourself from
them.

Examples
Computer crime laws in many states prohibit a person from performing certain acts without authorization,
including:
• Improperly accessing a computer, system, or network;
• Modifying, damaging, using, disclosing, copying, or taking programs or data;
• Introducing a virus or other contaminant into a computer system;
• Using a computer in a scheme to defraud;
• Interfering with someone else's computer access or use;
• Using encryption in aid of a crime;
• Falsifying email source information; and
• Stealing an information service from a provider.

Software sabotages
• Computer sabotage involves deliberate attacks intended to disable computers or networks for the
purpose of disrupting commerce, education and recreation for personal gain, committing
espionage, or facilitating criminal conspiracies, such as drug and human trafficking. According to
the Federal Bureau of Investigation, computer sabotage costs billions of dollars in legal fees to
recover damages such as identity theft and to repair vital infrastructure that serves hospitals,
banks and 911 services.
• of malware, such as bots, worms, viruses and other spyware, which enables hackers to gain illegal
access to personal and corporate computers. Apart from theft of services and wire fraud, such
sabotage facilitates pedophiles who stalk children online at school and at home, identity thieves
who duplicate fake IDs for illegal immigrants, and home invasion rings and other criminals who
use malware to identify potential victims.
• Protecting yourself from computer sabotage means taking proactive measures to guard hardware
and software. Besides installing and maintaining a firewall and antivirus software, establish
separate user IDs for each person who uses a computer. Never post lists of usernames and
passwords, and take the time to change passwords as soon as an account shows signs of having
been tampered with. When using a public, school or workplace computer, always report lags and
aberrant performance to alert support staff that the system may have been compromised.
Hacking
• Hacking refers to activities that seek to compromise digital devices, such as computers,
smartphones, tablets, and even entire networks. And while hacking might not always be
for malicious purposes, nowadays most references to hacking, and hackers, characterize
it/them as unlawful activity by cybercriminals—motivated by financial gain, protest,
information gathering (spying), and even just for the “fun” of the challenge.
• Many think that “hacker” refers to some self-taught whiz kid or rogue programmer
skilled at modifying computer hardware or software so it can be used in ways outside the
original developers' intent. But this is a narrow view that doesn't begin to encompass the
wide range of reasons why someone turns to hacking.

Electronic Trespassing
• A person is guilty of computer trespass if s/he intentionally and without authorization
accesses, alters, deletes, damages, destroys, or disrupts any computer, computer system,
computer network, computer program, or data. Computer trespass is directed generally
towards computer hackers.
• There are state specific laws on the subject which varies from state to state. However a
key element for all computer trespass offenses is lack of authorization to access a
computer or computer system

Reducing Risks
• Only open emails or download software/applications from trusted sources
• Do not click on links or open attachments in emails which you were not expecting to receive, or
come from an unknown sender
• Backup all important files frequently, and store the back ups independently from your system
(ensuring you are following your company’s policy in doing so where this is business related)
• Ensure you have the latest anti-virus software installed on all systems and mobile devices, and
that it is constantly running
• Ensure all security vulnerabilities are patched as soon as practically possible after they are
released
• Secure email systems to protect from spam emails
• Use strong and unique passwords which should be changed regularly
• If you are working from home, do not allow your children and other family members to use your
work devices to ensure confidentially of sensitive information is maintained and to minimize the
risk of any accidental deleting or modification of information, or even worse, any accidental
infection to your device
• If you are uncertain about anything discuss the issue with your Data Protection Officer
Firewall
• A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of
security rules.
• Firewalls have been a first line of defense in network security for over 25 years. They
establish a barrier between secured and controlled internal networks that can be trusted
and untrusted outside networks, such as the Internet. 
• A firewall can be hardware, software, or both.

Encryption
• Encryption is the method by which information is converted into secret code that hides
the information's true meaning. The science of encrypting and decrypting information is
called cryptography.
Importance of encryption
• Encryption plays an important role in securing many different types of information
technology (IT) assets. It provides the following:
• Confidentiality encodes the message's content.
• Authentication verifies the origin of a message.
• Integrity proves the contents of a message have not been changed since it was sent.
Nonrepudiation prevents senders from denying they sent the encrypted message.
IT Security Audits
• A security audit is the high-level description of the many ways organizations can test and
assess their overall security posture, including cybersecurity. You might employ more
than one type of security audit to achieve your desired results and meet your business
objectives.

You might also like