Computer security

Computer security

First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives.
1. unauthorized use, access, modification, copying, and destruction of software or data (Bill Smith, the computer consultant, was convicted under recently enacted statutes covering this category of crimes);
2. theft of money by altering computer records or theft of computer time;
3. theft or destruction of hardware;
4. use or conspiracy to use computer resources to commit a felony; and
5. intent to obtain information or tangible property illegally through use of the computer (Doney 2) .
Chen 2
As seen above, these types of problems are almost all related to computer security. Shortly after, I will show you the statistics of computer crimes given by the Federal Bureau of Investigation (FBI). They show that in most of the crimes that happen on the Internet, almost 50 percent of the companies are breached. We also find the companies lose their money if they neglect the computer security, and the increasing trend of unauthorized access is from 1996 to 1997 from the tables below.
Table 1
Companies reporting financial losses attributable to specific types of high-tech criminal activity and other factor in 1996-1997.
Factor Percentage
Virus Infection 65%
Laptop Theft 57%
Abusive Use Of Internet 31%
Unauthorized Computer Use 16%
Telecommunications Fraud 16%
Information Theft 14%
Financial Fraud 12%
Sabotage 11%
Network break-in 8%
source: computer security institute survey for the FBI (McCollum 9).
Table 2
SECURITY BREACHES
Companies' responses when asked if their computer systems had been used without authorization.
1996 1997
YES 42% 49%
NO 37% 33%
DON��T KNOW 21% 19%
source: computer security institute survey for the FBI (McCollum 10).
Chen 3
In fact, these data are lower than reality, since we can��t be aware of all the activities of the Internet. So these facts prove that a computer system is very weak if it hasn��t the complete computer security. To avoid becoming a victim, improving the security is necessary for every computer system.
Next, we will practically understand the real situation of business and government. First, government agencies are always going to be targeted, but by no means can every agency oppose the hacker��s assault. Therefore, according to statistics made from the questionnaire of three hundred corporations and government agencies by American Bar Association (ABA) in 1987, seventy -two(24%), claimed to have been the victim of a computer-related crime in the 12 months before the survey. After 2 years, in 1989, the Florida Department of Law Enforcement (FDLE) surveyed 898 public and private sector organizations that use computers for their business. Eighty-eight (25%) reported they...

To view the complete essay, you be registered.