StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Information Technology Security - Essay Example

Cite this document
Summary
Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.3% of users find it useful
Information Technology Security
Read Text Preview

Extract of sample "Information Technology Security"

Download file to see previous pages

To do so we firstly need to understand the different types of frauds. Then we focus on what is identity theft, its growth using computers, and the possible precautions. Also the legal responses have been touched upon briefly. To understand the seriousness of identity theft we firstly need to know the different types of electronic frauds. The next section helps us understand the different electronic frauds. With the increased usage of computers and the Internet, there is a lot of movement data and personal information.

This is one of the biggest causes for the increase of electronic crime. E crime is treated very seriously and is every country has its own laws relating to the Internet usage. This document will provide a study of the computer related crimes and a few of the statistics of the various crimes that are conducted. Computer as known are automated data processing, communication or storage devices. Crimes as known are an act which is a violation of the law and regulations. A Computer Related Crime hence is a crime where the computers are used as an instrument for the crime.

Here the computers contain all the evidences of the crime. Criminals sort to manipulation of computer records for fraudulent activities. Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts. Also another common fraud is hacking, or cracking of software to modify customer data, like phone number and address can be changed easily without any proof or evidence. The cost of licences for software is very high, thus some of the criminals sort to create pirated versions of software.

Also with the growth and increase of internet usage, it is very common for people to receive viruses. These viruses can spread through online chat accounts, or even by email attachments. Some of the viruses

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Information Technology Security Essay Example | Topics and Well Written Essays - 3750 words”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1556161-information-technology-security
(Information Technology Security Essay Example | Topics and Well Written Essays - 3750 Words)
https://studentshare.org/miscellaneous/1556161-information-technology-security.
“Information Technology Security Essay Example | Topics and Well Written Essays - 3750 Words”, n.d. https://studentshare.org/miscellaneous/1556161-information-technology-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Information Technology Security

IT Security and Sarbanes-Oxley Act

III) How the Sarbanes-Oxley Effects & Constraints on Information Technology Security (Industry & Management) Section 404 Compliance One of the ways the Sarbanes-Oxley Act of 2002 effects and constraints IT security section 404 compliance is by emphasizing a comprehensive understanding of internal controls, as a set of an enterprise's internal procedures, providing reasonable assurances that the enterprise will meet its target in all the specified areas.... According to SAI Global (2010), the portfolio that Information Technology Security Section provides also addresses matters beyond Sarbanes-Oxley, to tackle other auditing and legal dimensions of internal controls and the responsibilities that sundry and all actors dispense, when executing systems of internal controls....
5 Pages (1250 words) Term Paper

Digital Crime and Digital Terrorism

In those scenarios, a country's strong security apparatus will only be able to preempt those attacks, and also U.... which have faced terrorists' attacks and other security threats in the recent past have also initiated these steps.... This paper will first discuss US's government initiatives to protect its vital digital assets, then will discuss how it is crucial to protect both personal privacy as well as classified national security information, and finally will discuss how these classified assets could be breached and the safeguards that can be taken....
7 Pages (1750 words) Essay

Information Technology- Security

In the information technology- Security information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources.... Information assurances policies and its goals, mission and objectivesAn organization defines its information assurance policy as a course of actions pursued to enable organizations to obtain information assurance security....
2 Pages (500 words) Research Paper

Week 6 class discussions

It operates with the principle of robustness to be safe against any Information Technology Security Information Technology Security Week 6 Discussion Cryptography means secrete writing (Coron, 2006).... Week 6 Discussion 4 Information security threats at my house My household information technology infrastructure will be vulnerable to the following threats: Virus attacks, password stealing, hardware and software theft, deletion of data, fire, and the power problems....
2 Pages (500 words) Assignment

Analysis of the Problems of XYZ Company

The problem of the company is that their Information Technology Security system is not upgraded as per the market requirement, and the information is not safe.... In order to improve the Information Technology Security system to keep the confidential information of the company in safe hands, it is necessary that the IT security system should be strong enough.... However, the information technology department needs some improvement for that this Yardstick report will provide the solution....
4 Pages (1000 words) Assignment

Information Technology Security Risk

This research will begin with the statement that threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems.... They explore opportunities for security breaches to cause confidential data invasion via unauthorized access, amendment of data, removal of information from information systems.... Vulnerabilities can be distinguished as security loopholes in the system....
13 Pages (3250 words) Research Paper

Information Technology Security Management and Its Impact on Business Success

IntroductionThe current business field has developed to a level where corporate organizations use certain information technology applications to act as a medium of communication, transactions, book keeping and so on.... These are: To produce a report containing the High risk factors involved in IT security management and recommend ways of improvement.... To produce a report containing the high risk factors involved in IT security management and recommend ways of improvement....
12 Pages (3000 words) Thesis

Designing a Secure Network Infrastructure for E-Commerce

Masters in information security management is also meant for gaining specialist qualification in the changing information technology field.... Masters in information security management requires good understanding of the technologies necessary for information security, the technological issues, organizational issues, social issues and the relationship between information technology and other issues mentioned.... For this reason, it is important for a company to develop an information security system....
28 Pages (7000 words) Thesis
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us