StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware, Computer Crime and Fraud - Research Paper Example

Cite this document
Summary
The essay "Malware, Computer Crime and Fraud" aims to examine the problem of invasion of privacy as a form of computer crime. Furthermore, the paper discusses the use of different types of malware. Finally, the paper addresses the misuse of confidential government records…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Malware, Computer Crime and Fraud
Read Text Preview

Extract of sample "Malware, Computer Crime and Fraud"

Knowledge Question 1 - Computer Crime and Fraud Computer crime can be regarded as the unauthorized access and use of computer data by the users without prior permission. It is increasing day by day and is something which is not legal. It has been found that basically the users neither loose the data nor do they modify any data, and the most interesting thing is that the users doesn’t gives any indication that he has accessed the data. Computer crimes are the activities of hackers and crackers but it has been found that there are certain crime groups who are responsible for stealing of the data. 1 There are different classes of crimes in computer. It is observed that many a times the criminals steal passwords or the user name or may even change data and may delete the data. There are certain programmers who create malicious programs like worms, viruses, trojan horses, logic bombs and hoax. This is also a class of computer crime. Persecution and harassment is another class of computer crime which generally takes place in cyber space. If the criminal keeps sending the email to the person who doesn’t wants to receive such mails then it’s a type of harassments and may be classified as computer crime. There are many such examples of computer crimes. There are serious provisions of punishment for the criminals committing such crime. 2 Criminals, today, have become so expert that they manipulate the computer in order to obtain the information that they want and the user becomes the casualty of computer fraud. In order to cheat the user, the criminal must have access to the users’ personal information. This information can be easily obtained through software known as spyware. Spywares are installed in the computers and it has the capability to control the users’ activity. It collects users’ information without letting user know about it. It collects data like telephone number, name, address and email domain or even the financial credentials. After that the criminal has taken all the data from the user, they commit computer fraud. With the information obtained, the criminal can commit whole lot of malicious activities. Therefore, it is important to preserve and prevent all the important data so that they do not fall in the hand of computer frauds and criminals. 3 Question 2 - Viruses, Worms, Trojan Horses (Malware) Even though the terms virus, worms or Trojan horses are used interchangeably but then there is vast difference among all the three of them. They are all computer programs that are responsible to damage the computer system. Viruses are buzz word in today’s world. It is often heard that the computer is infected by viruses. It is important to know what virus is. Viruses are something that gets attached to the programs, folders or files automatically. The main intention of the creator of the virus is to spread those viruses from one computer to another computer automatically. There are different types of viruses, some cause a little damage to the file where as some may damage the system in such a way that goes beyond repair. Viruses alone are not responsible for its spread but it is human activities that carries the infected file and spreads those virus programs. Computer worms are almost akin to the viruses by design. They also spread the way virus files are spread but the main difference between the two is that worms don’t need human involvement to spread themselves. The biggest danger from the worm is that it is able to self reproduce on the users’ computer system. It can send thousands of copies and cause damage to the computer system. As the worms’ moves in a network, it damages the computers’ memory. There are many worms that are designed in such a way that makes the machines zombies. People lose their money as well as privacy as because there system is infected by worms. 4 Trojan horses are the programs that are executable which means that whenever any file is opened some actions are performed. “exe”, “bat”, “com”, etc are the file extensions of executable programs. “dmsetup.exe” is the name of the Trojan file. 5 In the beginning, Trojans cause no damage to the system and might be useful too. But it starts damaging the entire system once it is installed. Whoever receives the Trojan file, opens it up thinking that it is a legitimate program but once those are installed they can cause severe damage to the system like it can change the desktop items, or can even damage the files and folders that are present in the computer. But the most important thing that can be noted is that Trojans don’t reproduce themselves, the way worm does. In order to prevent from such Trojans one must be well aware of the file extension that is hidden. Those files mustn’t be downloaded from websites which might carry Trojans. A thorough study of the file must be done before opening it. 6 Question 3 - Misuse of Confidential Government Records Various data regarding the preservation of records has been gathered through the NSW website. As per the demand of the topic, it is important to understand the key threats of the digital records and how the state archive can be at risk. The website indicates that the possible key threats for the digital records are the loss of authenticity of the records if they are not adequately or properly controlled or protected. Then, it can be unreadable because of the changes in the software application and hardware. Even physical deterioration can also be possible. Now with two practical examples of problems of keeping digital records can be discussed as below. 7 The first issue is regarding the health care sector. The Brumby Government had admitted that the patients’ confidentiality could not be protected through its $323 million computer system. In this regard, the Melbourne physicians had said that the privacy of the patients had been compromised because of the overdue Health Smart Project. The physicians were worried as the intimate details of the patients could be accessible to the Victorians and the Government was quizzed regarding the potential breaches of privacy. 8 The second issue is about records of the biggest pathology lab of the Queensland. It can be considered as an alarming privacy breach as the lab authority had splashed medical histories of the patient over the internet. This event had occurred on 28th March of 2009. The contact numbers, names and private details of hundreds of patients, were plastered on the website of Sullivian Nicolaides which is in Brisbane. The breach has raised a question regarding the safety of electronic patient record systems. The affected angry patients were demanding for answers. The Courier-Mail had revealed that the number is 254 though the CEO of the company stated that it was 103 patients. It has been blamed on a processing error. As per the view of Peter Black, the internet law lecturer at Queensland University of Technology, this case could be analyzed under the Federal Privacy Act whether it was found that it had not complied with data security provisions. 9 In order tom take preventive measures for these issues, an association of government archival authorities from Australia and New Zealand had formed the Australasian Digital Recordkeeping Initiative (ADRI) in 2004. The primary objective behind forming of ADRI is to pool resources and enhance expertise to find best possible ways to ensure that the digital records are preserved efficiently and can be accessed for the future. References Caldwell, Anna. & Earley, David. Sullivan Nicolaides has 254 Patient Profiles on Net.” News. http://www.couriermail.com.au/news/sullivan-nicolaides-has-254-patient-profiles-on-net/story-e6freon6-1225698815201. ( accessed 22 July, 2010). Computer Secure. “Virus, Worms and Trojan Horses”. Computer Virus. http://computersecure.net/information/virus_worm_trojan_horse_information_01.html. (accessed July 21, 2010). Lo, Joseph. “Trojan Horse Attacks”. What is Trojans. http://irchelp.org/irchelp/security/trojan.html (accessed July 21,2010). Mariosalexandrou. “Computer Crime Definition”. Definition. http://www.mariosalexandrou.com/definition/computer-crime.asp [accessed July 21, 2010]. Northern Territory Government. “Record Security and Access”. Records. http://www.nt.gov.au/nreta/ntas/records/ntg/security.html (accessed July 21, 2010). NSW. “The Digital Records Preservation Challenge”. State Records. http://www.records.nsw.gov.au/recordkeeping/topics/digital-recordkeeping/digital-records-preservation-discussion-paper/the-digital-records-preservation-challenge. (accessed 22 July, 2010). Rolfe, Peter. “Health Privacy 'at risk'”. News. http://www.heraldsun.com.au/news/victoria/health-privacy-at-risk/story-e6frf7kx-1111116106473. ( accessed 22 July, 2010). SpamLaw. “Computer Fraud”. Basis of Computer Fraud. http://www.spamlaws.com/computer-fraud.html (accessed July 21, 2010). Standler, Ronald. “Computer Crime”. Crime. http://www.rbs2.com/ccrime.htm. (accessed July 21, 2010). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Malware, Computer Crime and Fraud Research Paper”, n.d.)
Malware, Computer Crime and Fraud Research Paper. Retrieved from https://studentshare.org/information-technology/1739836-knowledge
(Malware, Computer Crime and Fraud Research Paper)
Malware, Computer Crime and Fraud Research Paper. https://studentshare.org/information-technology/1739836-knowledge.
“Malware, Computer Crime and Fraud Research Paper”, n.d. https://studentshare.org/information-technology/1739836-knowledge.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware, Computer Crime and Fraud

Computer Fraud and Abuse Act

In the paper “Computer fraud and Abuse Act,” the author discusses computer fraud, which entails committing fraud through using unauthorized access to information technology, and such acts are prohibited by the United States Computer fraud and Abuse Act.... With examples, this paper will question the legitimate effect of the CFAA: Has it been a success or failure in preventing computer fraud and abuse?...
3 Pages (750 words) Essay

Identity Theft: Problems and Solutions

This report aims at The main focus is on the theft of identity using computer.... The graph of the improvement has been sloping upwards and is continuing to be so.... Technology has become a very important part of everyone's life and now a switch of a button can do almost anything....
4 Pages (1000 words) Essay

Albert Gonzalez Credit Card Theft

This stopped people from trying to use internet as a means of stealing money or another fraud activity because they knew that it could be traced back to them.... Thus it becomes almost impossible to track and convict criminals on internet fraud.... This type of fraud has increased over the years with the increase in usage of credit cards.... The availability of all types of services through credit cards ensures that they become an attractive option for fraud, especially when it comes to online purchases....
7 Pages (1750 words) Research Paper

How the Internet has aided criminal activity

Federal computer crime Cases Involving Teens.... computer crime & Intellectual Property Section.... Federal computer crime Cases Involving Teens.... computer crime & Intellectual Property Section.... Phishing and Pharming: Helping consumers avoid Internet fraud.... The misuse of the computer may involve the falsification of computer signatures through unauthorized codes; the creation of false bank accounts; theft of personal information and misuse of the stolen information; the virus infection created on computers that can hamper the proper software operations and damage records (Computer-Based crime, 2011)....
2 Pages (500 words) Essay

Protection against Electronic Crimes

Have you ever studied e-crime and methods of its prevention during your career?... Examples of e-crime that needs vigilance include distribution of damaging electronic viruses, launching a denial-of-service attack, financial fraud, distribution of objectionable materials and malware. Yes, my brother-in-law lost $12,945 in December 2013 from his account.... xamples of e-crime that needs vigilance include distribution of damaging electronic viruses, launching a denial-of-service attack, financial fraud, distribution of objectionable materials and malware....
2 Pages (500 words) Assignment

The Changing nature of crime in the twenty-first century

As much as this may have growing benefits in the industrial environment, an increase I technology has also provided an opportunity… Various cyber related crimes including: financial crimes such as online financial services infringement and online fraud; attacks on computer hardware or software such as network intrusion, malware, and botnets; intellectual property crimes; and abuse The Changing Nature of Crime al Affiliation) The Changing Nature of Crime At the current rate, the increase in technologywill allow individuals to have a better access to information at a faster rate in the near future....
1 Pages (250 words) Essay

Government Police and Justice Act 2006

"Government Police and Justice Act 2006" paper outlines the offenses which it could be argued have been committed under the computer Misuse Act 1990 and the Police Justice Act 2006 and applies the law relating to the offenses you have already outlined to the incidents involving Michael.... nbsp; In order to determine the offenses that have been committed in the above scenario, it is necessary to examine the computer Misuse Act 1990 and the Police and Justice Act 2006....
9 Pages (2250 words) Assignment

Analysis of Internet Auction Fraud

IntroductionInternet fraud is the act of deceiving through solicitations to acquire fraudulent transactions through the internet.... IntroductionInternet fraud is the act of deceiving through solicitations to acquire fraudulent transactions through the internet.... In the USA the Federal Bureau of Investigation put the internet auction as the highest fraud on the internet at 35% to 40% of the complainants in the year 2007 (Darcy, p.... Internet auction fraud occurs when persons or entities put auction advertisements of merchandise on the net but either fail to deliver or deliver the merchandise in less value or proportions from those that were advertised upon purchasing....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us