Computer Crime and Security

College
Essay
Miscellaneous
Pages 6 (1506 words)
Download 0
Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…

Introduction

Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. ...
Download paper
Not exactly what you need?

Related papers

Computer Security
One study was done by a group of academicians. The second study was done by computer security professionals. One is a seminal work carried out by Farzeneh Asghapour, Debin Lin and Jean Camp (2007) in assessing the indirect and implicit use of mental models applied to computer security. Asghapour et. al., (2007) did three experiments which revealed corresponding results. First, the experiments…
Computer Security Analyses
As we increasingly depend on sophisticated internet and networks, the threat perceptions will also correspondingly increase, posing a potential danger to the overall security of data and information.…
Computer Crime and Security
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future…
Internet Security. The inherent weaknesses of the TCP/IP protocols
The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable (Jelena Mirkovic et al. (2005) p38).…
Computer Crime
They apply different techniques of payment like credit card, e-cheques, and shopper's card. Smart-cards and e-wallets are few techniques to protect customer's information and convenient and safe for transactions and processing of data.…
Assessment
75% of participants in the study indicated they had experienced financial losses as a result of information security incidents (Richardson, 2003). Healthcare organizations are in an especially vulnerable position because of the sensitivity of the information stored on their systems. Accordingly, it is imperative that Healthcare Oganization A adopt and implement an intrusion detection system (IDS).…
Security Organization
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future…