StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Rationale behind Increasing Computer Crime - Essay Example

Cite this document
Summary
It is evidently clear from the paper "Rationale behind Increasing Computer Crime" that hackers dent into the security system of companies to steal sensitive data. The instances of increasing software piracy and data theft certainly reflect that computer crime is increasing…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Rationale behind Increasing Computer Crime
Read Text Preview

Extract of sample "Rationale behind Increasing Computer Crime"

Online Transaction has raised the alarm regarding security check that is essential to eradicate 3 different Computer crimes - fraud, identity theft, and compliance with a legal issue. They apply different techniques of payment like credit cards, e-cheques, and shopper’s cards. Smart cards and e-wallets are a few techniques to protect customers’ information and convenient and safe for transactions and processing of data.

Suggestion for Tracking down Offenders of Computer Crime

            Privacy has also grown in stature similar to security concerns to keep the personal information of customers intact. Technology and outsourcing model of business has taken the pressure off the management team to some extent. Encryption, VPN, Firewall, SSL, and precautionary measure from the customer is essential in keeping the security system in control (Ghosh, 2001). The customer follows the three mandatory steps for processing the transactions. He enters the details of the credit card to the e-merchant or payment gateway that passes through the secure socket layer (SSL) of the server and the digital certificate of the online service provider.  Once validation in the initial layers of the security check is complete, details provided by the customer are processed by the associated bank that handles the complex security information collected in the payment gateway. This collects the details of the order and customer through an e-business associate to finally approve the transaction.

            Authentication is the first step in privacy matters that can ensure that the right person is using the card.  VeriSign Secure Site Program shows the sign of trust when someone uses the websites to purchase the product using his credit card which requires sensitive personal information. Public key infrastructure (PKI) and digital certificates supplement the encrypted algorithm to encounter the challenges of illegal activity and augment the business operations to target potential customers. Firewalls are another method of network security that prevents unauthorized access to the sensitive link. Virtual Private Network (VPN) gives secure access to a firm’s network. The recent development in technologies provides a way to track the offenders of computer crime by checking the security measures applied for the safety of information (Johnson, 2009).

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Crime Essay Example | Topics and Well Written Essays - 500 words”, n.d.)
Computer Crime Essay Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/miscellaneous/1514812-computer-crime
(Computer Crime Essay Example | Topics and Well Written Essays - 500 Words)
Computer Crime Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/miscellaneous/1514812-computer-crime.
“Computer Crime Essay Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/miscellaneous/1514812-computer-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Rationale behind Increasing Computer Crime

Computer-Based Crimes: Identity Theft, Phishing and Pharming Scams

In the theft of personal information, victims may not even be aware of the crime perpetration until very considerable damage on their assets, credit card, and societal status has already been inflicted.... Criminals may use programs that would remove any evidence of the committed crime.... Today, the biggest crime created through computer use is the electronic financial account transfer.... Computer hackers commit such crimes for financial reasons and for personal motives, such as anger or revenge (Computer-Based crime, 2011)....
8 Pages (2000 words) Essay

The Negative Impacts of Cybercrime on Business and Society

computer crime (commonly referred to as cybercrime) is a reference to any type of criminal activity that involves the use of a computer or an internal/external network.... This type of activity has been increasing at alarming rates over the past few decades, to the point that seemingly no one is immune from becoming a victim (Dearne, 2002, p....
7 Pages (1750 words) Research Proposal

The Role of Computers in Industrial Espionage

People are in the world in which the economic condition of nations and the “competitiveness of businesses is determined largely by the ability to develop, commercialize, and capture the economic benefits from scientific and technological innovations.... ?? (Nasheri,) As the.... ... ... et and other technological advances persist to reshape the way we operate in government and industry, and as competitions become stiffer means are created to efficiently facilitate how one would do business....
7 Pages (1750 words) Research Paper

The Threat of Computer Crime

The paper "The Threat of computer crime" highlights that the property owners should take logical and rational steps to protect their properties so as to enforce laws relating to property rights.... computer crime is an offense where computers or electronic gadgets are used as a tool to carry out certain crimes.... computer crime circumscribes all sorts of illegal activities like the transgression of copyrights, child pornography, hacking, etc....
9 Pages (2250 words) Research Proposal

Open Source Intelligence and Privacy in Criminology

From the paper "Open Source Intelligence and Privacy in Criminology" it is clear that the fact that computer science systems allow criminologists and law enforcement to collect evidence and develop crime patterns and fashion crime-mitigation systems is sufficient evidence that it is highly relevant to policing.... There is the hope of stopping the incidence of crime, through addressing the causes of crime at the individual level, which can result in social reforms....
17 Pages (4250 words) Research Paper

Case Study of a Biomatric surveillance technology on primary school children

Rather, schools must critically engage learners on the various surveillance technologies available in the bigger world, the rationale behind them and their implications.... The theory underpinning the effectiveness of public surveillance systems, including biometrics and CCTV, is that if potential offenders know that they are being monitored, they will keep off committing an offence or a crime(Webster , 1995).... This assumption is in line with the rational choice theory, which states that potential offenders make deliberate, well-thought decisions to commit an offense or a crime after they have carefully assessed the possible costs and benefits associated with the crime(La Vigne, et al....
5 Pages (1250 words) Essay

Computer Crimes in the Modern World

According to (Parker, 2002), 'the exploitation of computer has given birth to a concept called 'computer crime'' (Parker, 2002).... In most simple word computer crime can be defined as the unlawful actions by using a computer or against a computer system.... The Internets user-friendliness and convenience have given birth to modern ways for computer crime, renowned forms of which are phishing, pharming, and vishing (Laudon & Laudon, 1999, p.... The biggest pessimistic use of the computer is for crime purposes....
8 Pages (2000 words) Term Paper

Digital Crime and Digital Terrorism

his paper looks at issues relating to digital or computer crime and digital terrorism; however, it gives an overview in these aspects meaning that it will not go into deep technical aspects of the issues.... This report "Digital crime and Digital Terrorism" demonstrates digital criminals and digital terrorists that have beneficiated greatly by the use of information technology due to safer means of communication.... Digital crime and digital terrorism are growing at an increasing rate as the variety and the frequency of the offenses are increasing and also since more dangerous crimes are being committed using little physical resources....
6 Pages (1500 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us