-->

Ads 720 x 90

COMPUTER CRIME SECURITY AND ETHICS

Computer Crime
Software Privacy: this involves the unauthorized copying, use or selling of software that is copyrighted. This is an infringement of ownership rights. In fact it is a theft of the work and effort made by an individual or a company. When an individual or a company buys a software package, the product comes with a license agreement dictating the number of computers, it can be used on, for example if a company or individual breaks a license agreement, they are guilty of software privacy.
However, it is not all software that is copyrighted. For instance, public domain software is not copyrighted it can be copied.

Hacking: Hacking refers to Unauthorized accessing of computer system, the person that does this is called Hacker. The more criminally hackers access computer systems for one or more of the following reasons: (1) To copy programs illegally (ii)  to transfer money from one account to another. (iii) To steal important and highly confidential data (iv) to alter data on the system (v) To install a virus to destroy the system (iv) To destroy data by deleting it.

Internet Fraud
This takes place mainly in the bogus selling of product over the internet. For example, internet fraud occurs when a bogus company or an individual bills the customer for the purchase, collect the money, and then does not deliver the items  paid for or he can even deliver a product that is substandard when you compare it with what the person actually paid for on the internet.

Security and Ethics
Sources of security breaches
sources of security breaches include the following

  1.  Virus and Trojan horses
  2. Poorly implemented network
  3. Poorly implemented or lack of ICT  policy
  4. Carelessness in giving out personal and vital information on net without careful screening.
  5. Hackers who fraudulently have access to people's private information (details)


Preventive Measures
The following methods can be adopted to prevent those areas of security breaches

  1. use of antivirus software
  2. use of fire wall
  3. exercising care in giving out personal information.
  4. proper network implementation and policy
  5. using sites with web certificate
  6. exercising care in opening e-mails attachments
  7. data encryption, this involves encoding (scrambling) data during storage or transmittion so that it cannot be understood by someone who does not have the encryption key or software to convert it back to its original form.


Legal Issues
copyright: some software are copyrighted. When an individual or a company busy a software package, the product comes with a license agreement on usage ans such software are not meant for unauthorized people to copy from.

Ownership rights to 

  1. text
  2. images
  3. audio
  4. video


Web Content
This must be subject to existing laws of host country.
piracy - software, audio, video

Cyber crimes


  1. identity theft
  2. Internet fraud


Computer Room: This may be defined as a room designed for keeping computers and other related devices such as: Printer, diskette, fan, clock, thermometer etc.

Ways of maintaining computer room

No visitors: Computer room should be a restricted place, it should be kept under a very tide security and visitors should not be allowed into computer room.

Smoking: This might be very dangerous, thus no smoking should  be permitted within the computer room or environment.

Noise: A high degree of tranquility should be maintained within the computer room. Unnecessary noise should be avoided in the computer room or environment as much as possible.

Eating: A computer room should not be converted to a restaurant or canteen. Eating in whatever form should be discouraged in the computer room.

Security: Because of the calibre of machine and equipment kept in the computer room, there should be a very strong security arrangement within such environment

Usage: Effective use should be made of the machine if they remain dormant for a long time the tendency is that they will get spoilt easily.

Explosives: No explosive material or items should be allowed into the computer room or its immediate environment.

Cleaning: computer room should be kept tidy it should not be subjected to dust and dirty

Air-Conditioners: There must be working air-conditioners that will help to keep the computer room very cool.

Switching Off: When computers and other electrical appliances are not working or in use they must be switched off.

Dust Free: There should be maintenance of dust free environment.

Ventilation: There should be appropriate ventilation.

Lighting System: The lighting system should be well taken care of in the computer room.


Laboratory Rules and Regulations

The chairs and tables should be arranged in a comfortable manner.
the computer and their peripherals should be kept in an orderly

Related Posts

Subscribe Our Newsletter