Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.
Complete 7 pages APA formatted article: Computer Crimes and their Avoidance. Thereupon, a discussion is taken up regarding firewalls and their use. and thereafter, a discussion is appended regarding t
Complete 7 pages APA formatted article: Computer Crimes and their Avoidance. Thereupon, a discussion is taken up regarding firewalls and their use. and thereafter, a discussion is appended regarding the nature and importance of a disaster recovery plan.
Hacking is a very common computer crime, in which hackers control computer systems in a network and operate them for their own illegal purposes. Hacking is unlawful activity, irrespective of its form. Nevertheless, hacking is helpful in determining the vulnerability of computer systems in a network or in respect of an individual PC. Such attacks enable their perpetrator to determine the scope for clandestinely programming computer systems and their consequent exploitation. Some individuals employ hacking attacks to gain access to computers maintained by corporations or the government, so as to reveal the openness of the security systems and to prove their ability to access highly protected computer networks. For these individuals, hacking is an art that enables them to access other computers (Stone, 2002).
Hackers often share their knowledge and strategies among themselves. Some of them form groups for this purpose and even organize conferences. Hacking dates back to the mid-1950s, when hackers made telephone calls free of cost, by exploiting loopholes in the telecommunication networks. To avoid the adverse effects of hacking, it is necessary to install and implement effective security systems in computers. More importantly, the software must be safe, stable, and dependable. The enforcement authorities need to test the software and certify that is safe and reliable. Furthermore, computer users have to install firewalls and utilize encryption methods. In addition, computer users have to be wary of hacking attacks (Stone, 2002).
Phishing is a computer crime, in which the offender steals the identity of online computer users. Subsequently, the offender impersonates the original user and carries out financial and other online transactions. In phishing, the perpetrator sends an email message to the vulnerable computer user and allures the user to provide personal details, bank account number, and other information. The emails sent by the offender appear to be from a legitimate source, with which the victim enters into regular transactions.