We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computer Crime and Security - Essay Example

Comments (0)
Summary
Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…
Download full paper
GRAB THE BEST PAPER

Extract of sample
Computer Crime and Security

Download file to see previous pages... Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. The United States Department Of Commerce (2000) highlighted this threat in its report on the proliferation of computer use and internet access, not just in the United States but, across the world. As the greater majority of corporations, both in the United States and worldwide, are relying on IT for data storage and processing, increased popular access to IT renders corporate systems vulnerable to unauthorized penetration and the associate accessing of private and confidential data (U.S. Department of Commerce, 2000). While it is the responsibility of corporate entities to ensure the securitization of their networks, absolute inviolability is practically impossible to achieve. It is, thus, that recent years have witnessed the ever-increasing adoption of computers in the commission of crimes of fraud and theft (Power, 2000). Our company has recently fallen victim to one such incident.
3 Incident Overview
On January 16th, 2008, a periodic review of our IT activities logs evidenced a string of unusual activities. Almost 10,000 patient files had been accessed and the data they contained had been transferred to an external medium, possibly an external hard drive. The IT department had no record of authorizing any individual this level of access and, indeed, there was no legitimate justification for the access of 10,000 patient files. The incident was terribly worrisome as these files contain sensitive data such as patients' social security, insurance and credit card numbers, not to mention home and place of employment addresses and contact information. The IT department immediately contacted the Legal Department and appraised its Director of the situation who, in turn, contacted law enforcement and did the same.
4 Post Mortem
After reporting the incident to the Legal Department and law enforcement officials, the IT department launched an intensive post mortem investigation. The investigation, which followed standard procedures which will be described shortly, had several objectives. These were the identification of the source, as in whether it was an insider or outsider incident; ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
Computer security
The following are the major, recent computer security threats: Blended threats This refers to a combination of spyware and malware attacks on a computer. This is the major current threat, where the attackers are blending malware software with spyware software and sending them to individual emails or chat rooms in form of a URL link (Trend Micro, 2008).
3 Pages(750 words)Essay
Computer Security
As the severity of cyber threats become increasingly more sophisticated because of the alternating reasons behind hacking, so are the set strategies to aid in combating them. Current techniques to provide digital security are executed with a woefully inadequate strategy, considering a frighteningly short time horizon.
30 Pages(7500 words)Essay
Computer Security
Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations. However, the studies differ in the study goals and scope, methodology and analysis. The importance of computer security has been emphasized by two expert studies.
9 Pages(2250 words)Essay
Computer Crime
Hackers further dents into the security system of companies to steal sensitive data. The instances of increasing software piracy and data theft certainly reflect that computer crime is increasing. Online Transaction has raised the alarm regarding security check that is essential to eradicate 3 different Computer crimes - fraud, identity theft and compliance with legal issue.
2 Pages(500 words)Essay
What is meant and understood by the term computer misuse
However, linked to the Internet technology is the low cost, ease of use and anonymity, which has also made the Internet a breeding ground for criminal activity, leading to unforeseeable
6 Pages(1500 words)Essay
Computer crime
Criminals are not a product of congenital traits but they are a product of the environment by which they are surrounded. The atrocities are growing at a fast pace in today’s’ world. One of the major antisocial behavior is computer crime in the
7 Pages(1750 words)Essay
Summarize
The respondents were pooled from organizations covering a number of industries, which include government, manufacturing, transportation, telecommunication, education, health services, and
2 Pages(500 words)Essay
Categories of Computer Crime
Criminals use computers to facilitate the embezzlement of money and properties; theft of confidential records; and alteration and destruction of valuable files. The misuse of the computer may involve the falsification of computer signatures through
2 Pages(500 words)Essay
Computer crime
et crimes whereas cyber-crimes are the crimes which are intended to individuals or the society to harm the reputation or cause physical harm to the victim, directly or indirectly. These crimes are committed using communication networks, which mostly are threats circulated in the
1 Pages(250 words)Research Paper
Computer security
The report stipulates that computer security licensing, is indeed an antisocial behavior that harbors social cohesion. However, it has contributed efficiently to reducing computer fraud over the years.
6 Pages(1500 words)Essay
Let us find you another Essay on topic Computer Crime and Security for FREE!
Contact us:
+16312120006
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us