Got a tricky question? Receive an answer from students like you! Try us!

Computer Crime and Security - Essay Example

Only on StudentShare
College
Essay
Miscellaneous
Pages 6 (1506 words)

Summary

Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…

Extract of sample
Computer Crime and Security

Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. ...
Download paper
Not exactly what you need?

Related Essays

Internet Security. The inherent weaknesses of the TCP/IP protocols
The most common method involves flooding the victim machine with external communications requests, so much so that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable (Jelena Mirkovic et al. (2005) p38).…
4 pages (1004 words)
Computer Crime
They apply different techniques of payment like credit card, e-cheques, and shopper's card. Smart-cards and e-wallets are few techniques to protect customer's information and convenient and safe for transactions and processing of data.…
2 pages (502 words)
Assessment
75% of participants in the study indicated they had experienced financial losses as a result of information security incidents (Richardson, 2003). Healthcare organizations are in an especially vulnerable position because of the sensitivity of the information stored on their systems. Accordingly, it is imperative that Healthcare Oganization A adopt and implement an intrusion detection system (IDS). Following a definition of IDS, this essay will argue the imperatives of our organization are adopting such a system.…
4 pages (1004 words)
Security Organization
Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.…
6 pages (1506 words)