Смекни!
smekni.com

Computer Fraud And Crimes Essay Research Paper

Computer Fraud And Crimes Essay, Research Paper

Computer Fraud and Crimes

In the world of computers, computer fraud and computer crime are very prevalent

issues facing every computer user. This ranges from system administrators to

personal computer users who do work in the office or at home. Computers without

any means of security are vulnerable to attacks from viruses, worms, and illegal

computer hackers. If the proper steps are not taken, safe computing may become

a thing of the past. Many security measures are being implemented to protect

against illegalities.

Companies are becoming more aware and threatened by the fact that their

computers are prone to attack. Virus scanners are becoming necessities on all

machines. Installing and monitoring these virus scanners takes many man hours

and a lot of money for site licenses. Many server programs are coming equipped

with a program called “netlog.” This is a program that monitors the computer use

of the employees in a company on the network. The program monitors memory and

file usage. A qualified system administrator should be able to tell by the

amounts of memory being used and the file usage if something is going on that

should not be. If a virus is found, system administrators can pinpoint the user

who put the virus into the network and investigate whether or not there was any

malice intended.

One computer application that is becoming more widely used and, therefore, more

widely abused, is the use of electronic mail or email. In the present day,

illegal hackers can read email going through a server fairly easily. Email

consists of not only personal transactions, but business and financial

transactions. There are not many encryption procedures out for email yet. As

Gates describes, soon email encryption will become a regular addition to email

just as a hard disk drive has become a regular addition to a computer (Gates

p.97-98).

Encrypting email can be done with two prime numbers used as keys. The public

key will be listed on the Internet or in an email message. The second key will

be private, which only the user will have. The sender will encrypt the message

with the public key, send it to the recipient, who will then decipher it again

with his or her private key. This method is not foolproof, but it is not easy to

unlock either. The numbers being used will probably be over 60 digits in length

(Gates p.98-99).

The Internet also poses more problems to users. This problem faces the home

user more than the business user. When a person logs onto the Internet, he or

she may download a file corrupted with a virus. When he or she executes that

program, the virus is released into the system. When a person uses the World

Wide Web(WWW), he or she is downloading files into his or her Internet browser

without even knowing it. Whenever a web page is visited, an image of that page

is downloaded and stored in the cache of the browser. This image is used for

faster retrieval of that specific web page. Instead of having to constantly

download a page, the browser automatically reverts to the cache to open the

image of that page. Most people do not know about this, but this is an example

of how to get a virus in a machine without even knowing it.

Every time a person accesses the Internet, he or she is not only accessing the

host computer, but the many computers that connect the host and the user. When

a person transmits credit card information, it goes over many computers before

it reaches its destination. An illegal hacker can set up one of the connecting

computers to copy the credit card information as it passes through the computer.

This is how credit card fraud is committed with the help of the Internet. What

companies such as Maxis and Sierra are doing are making secure sites. These

sites have the capabilities to receive credit card information securely. This

means the consumer can purchase goods by credit card over the Internet without

worrying that the credit card number will be seen by unauthorized people.

System administrators have three major weapons against computer crime. The

first defense against computer crime is system security. This is the many

layers systems have against attacks. When data comes into a system, it is

scanned for viruses and safety. Whenever it passes one of these security layers,

it is scanned again. The second resistance against viruses and corruption is

computer law. This defines what is illegal in the computer world. In the early

1980’s, prosecutors had problems trying suspect in computer crimes because there

was no definition of illegal activity. The third defense is the teaching of

computer ethics. This will hopefully defer people from becoming illegal hackers

in the first place (Bitter p. 433). There are other ways companies can protect

against computer fraud than in the computer and system itself. One way to

curtail computer fraud is in the interview process and training procedures. If

it is made clear to the new employee that honesty is valued in the company, the

employee might think twice about committing a crime against the company.

Background checks and fingerprinting are also good ways to protect against

computer fraud.

Computer crime prevention has become a major issue in the computer world. The

lack of knowledge of these crimes and how they are committed is a factor as to

why computer crime is so prevalent. What must be realized is that the “weakest

link in any system is the human” (Hafner and Markoff p. 61). With the

knowledge and application of the preventative methods discussed, computer crime

may actually become an issue of the past.

Works Cited

Bitter, Gary G., ed. The MacMillian Encyclopedia of Computers. MacMillian

Publishing Company: New York, 1992.

Gates, William. The Road Ahead. New York : Penguin Books, 1995.

Hafner, Katie & John Markoff. Cyberpunk. New York : Simon and Schuster, 1991.

Romney, Marshall. “Computer Fraud ? What Can Be Done About It?” CPA Journal

Vol. 65 (May 1995): p. 30-33.