Main » Articles » ITGS » 2013

Chapter 10 Review & Appendix A(3 Apr. 2012)

End of Chapter Summary

Computers play an ever-increasing role in fighting crime. At the same time, law enforcement organizations are facing an increase in computer crime—crimes accomplished through special knowledge of computer technology. Most computer crimes go undetected, and those that are detected often go unreported. But by any estimate, computer crime costs billions of dollars every year.

Many computer criminals use computers and the Internet to steal intellectual property. Many steal credit card numbers and other sensitive information that can be used for financial gain. Some steal entire identities. Others use Trojan horses, viruses, worms, logic bombs, and other types of malware to sabotage systems. According to the media, computer crimes are committed by young, bright computer wizards called hackers. Research suggests, however, that hackers are responsible for only a small fraction of computer crimes. The typical computer criminal is a trusted employee with personal or financial problems and knowledge of the computer system. Some types of computer crimes, including software piracy, are committed by everyday computer users who don’t realize—or choose not to recognize—that they’re committing crimes.

Because of rising computer crime and other risks, organizations have developed a number of computer security techniques to protect their systems and data. Some security devices, such as keys and badges, are designed to restrict physical access to computers. But these tools are becoming less effective in an age of networked PCs. Passwords, encryption, shielding, and audit-control software are all used to protect sensitive data in various organizations. When all else fails, backups of important data are used to reconstruct systems

After damage occurs. The most effective security solutions depend on people at least as much as on technology.

Normally, security measures serve to protect our privacy and other individual rights. But occasionally, security procedures threaten those rights. The trade-offs between computer security and freedom raise important legal and ethical questions.

Computer systems aren’t threatened only by people; they’re also threatened by software bugs and hardware glitches. An important part of security is protecting systems and the people affected by those systems from the consequences of those bugs and glitches. Because our society uses computers for many applications that put lives and livelihoods at stake, reliability issues are especially important. In modern military applications, security and reliability are critical. As the speed, power, and complexity of weapons systems increase, many fear that humans are being squeezed out of the decision-making loop. The debate over high-tech weaponry is bringing many important security issues to the public’s attention for the first time.


Edmodo pages for this topic
(includes assignment, more links and PTT;log in required).
Category: 2013 | Added by: Jerry (03/04/2012)
Views: 263 | Rating: 0.0/0
Total comments: 0
Only registered users can add comments.
[ Registration | Login ]
Section categories
2013 [52]
2014 [25]
Statistics
Map
Login form