Wednesday, May 8, 2019
Information Technology Security Essay Example | Topics and Well Written Essays - 3750 words
Information Technology Security - Essay ExampleTo do so we firstly necessitate to understand the different types of frauds. Then we focus on what is identity theft, its growth using computers, and the possible precautions. as well the legal responses have been touched upon briefly. To understand the seriousness of identity theft we firstly need to neck the different types of electronic frauds. The next section helps us understand the different electronic frauds. With the increased example of computers and the Internet, there is a lot of movement data and personal nurture. This is one of the biggest causes for the increase of electronic crime. E crime is treated very seriously and is every country has its own laws relating to the Internet usage. This document allow provide a study of the computer related crimes and a few of the statistics of the various crimes that are conducted.figurer as know are automated data processing, communication or storage devices. Crimes as known are an act which is a violation of the law and regulations. A Computer Related Crime thus is a crime where the computers are used as an instrument for the crime. Here the computers contain all the evidences of the crime. Criminals assort to manipulation of computer records for fraudulent activities. Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts.Also another common fraud is hacking, or gap of software to modify customer data, like phone number and address can be changed easy without any proof or evidence. The cost of licences for software is very high, thus some of the criminals sort to seduce pirated versions of software. Also with the growth and increase of internet usage, it is very common for people to receive viruses. These viruses can air through online chat accounts, or even by email attachments. Some of the viruses
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.