Overview Internet crime Types of Crime Security features Future
Internet crime Today’s world of computer crime,”Hacker”is a well known word. Hackers are people who try to get access to computer system illegally,usually from a personal computer,via a data communication network. Some hackers invade websites with taunting boasts and their own private jokes and victims feel violated.
Types of crime The trojan horse: refers to illegal instructions placed in the middle of a legitimate program. Zapping: able to bypass any security system. Bomb: A bomb causes a program to trigger damage under certain conditions.
Types of crime continued Data diddling: Which means changing data before or as it enter the system. Piggy backing: When an illicit user “rides” into the system on the back of another user.
Types of crime continued Salami:Refers to small slices of money that may be subtracted from large financial system undetected. Scavenging: The scavengers search the trash cans and dumpsters for printouts that contain information about credit card numbers account number.
Security Features Forensics: Computer forensic means the uncovering of computer stored information suitable for use in illegal procedures.Forensic experts work on tracing missing inventory or a court ordered subpoena for E-mail messages containing sexual harassment language
Security Features continued Security of software data and personal computers. Safeguarding the system against such threats as natural disaster, fire, accident, vandalism, theft, destruction of data and hackers. A person should have something recognizable to the computer and which will give him or her access to the computer room or locked terminal.(badge, plastic card, key, token) Now software can verify both scanned and online signatures.
Security Features continued Bio-metric security systems are coming on. The science measures an individual’s body characteristics, when you simply insert your finger into an identification machine. Some systems use the characteristics of the entire hand. Another way is the identification of the voice pattern or sometimes the identification is based on the retina of the eye which is harder to duplicate than a voice pattern.
The Future Employee damage will increase as the computer literacy increases. Financial crimes will increase. The virus will bring down the internet without any warning, unless any changes in the anti virus protection is made. Worse viruses can be expected. The use of unix is not enough to secure the internet, We need to have stronger authentication and end to end encryption.
The Future continued People will begin to feel that internet is not reliable. Criminals will continue to grow and smart criminals will remain hidden. The future of challenging automated crimes wold be packaged in a single computer program we have to use high level automated security.