Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Computer Security - School Essays

Computer Security


First, we have to understand these type of computer crimes such as below because they will let us know the computer crimes often happen in our lives.
1. unauthorized use, access, modification, copying, and destruction of software or data (Bill Smith, the computer consultant, was convicted under recently enacted statutes covering this category of crimes);
2. theft of money by altering computer records or theft of computer time;
3. theft or destruction of hardware;
4. use or conspiracy to use computer resources to commit a felony; and
5. intent to obtain information or tangible property illegally through use of the computer (Doney 2) .
Chen 2
As seen above, these types of problems are ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

criminal activity and other factor in 1996-1997.
Factor Percentage
Virus Infection 65%
Laptop Theft 57%
Abusive Use Of Internet 31%
Unauthorized Computer Use 16%
Telecommunications Fraud 16%
Information Theft 14%
Financial Fraud 12%
Sabotage 11%
Network break-in 8%
source: computer security institute survey for the FBI (McCollum 9).
Table 2
SECURITY BREACHES
Companies' responses when asked if their computer systems had been used without authorization.
1996 1997
YES 42% 49%
NO 37% 33%
DON¡¦T KNOW 21% 19%
source: computer security institute survey for the FBI (McCollum 10).
Chen 3
In fact, these data are lower than reality, since we can¡¦t be aware of all the activities of the Internet. So these facts prove that a computer system is very weak if it hasn¡¦t the complete computer security. To avoid becoming a victim, improving the security is necessary for every computer system.
Next, we will practically understand the real situation of business and ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Computer Security. (2004, September 17). Retrieved March 19, 2024, from http://www.essayworld.com/essays/Computer-Security/14502
"Computer Security." Essayworld.com. Essayworld.com, 17 Sep. 2004. Web. 19 Mar. 2024. <http://www.essayworld.com/essays/Computer-Security/14502>
"Computer Security." Essayworld.com. September 17, 2004. Accessed March 19, 2024. http://www.essayworld.com/essays/Computer-Security/14502.
"Computer Security." Essayworld.com. September 17, 2004. Accessed March 19, 2024. http://www.essayworld.com/essays/Computer-Security/14502.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 9/17/2004 07:32:32 PM
Category: Miscellaneous
Type: Premium Paper
Words: 826
Pages: 4

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Computer Security And The Law
» Computer Security
» Computer Security
» Computer Security
» Computer Security
» "Computer Security" By Time Lif...
» The Necessity Of Computer Secur...
» Computer Protection
» Protecting A Computer
» COMPUTER CRIME Hackers And Secu...
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved