Paper Details  
 
   

Has Bibliography
11 Pages
2748 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime and Ethics

my account for himself to collect later. This technique is similar to the round down technique.Masquerading relates to software theft. By using a legitimate user's login name and password to gain access to a computer system, a criminal could masquerade as a legitimate user without having to pay for his own account.Eavesdropping, listening to someone else's information, could result in devastating losses. A nosey eavesdropper can easily obtain credit card numbers, account numbers, and PIN numbers. Internet users should always be extremely cautious about releasing any important information on the web. Even secured transactions are not always safe from fraud.Tools used to break into computer systems can be obtained easily. Many can be found on underground Internet sites, discussion groups, or private bulleting boards on the web. These break-in programs are becoming more and more user-friendly to allow perpetrators to point and click their way around any system.In this world of computer crimes, how does one go about protecting themselves? For starters, a way to privatize your e-mail is to use an anonymous remailer. A remailer is a free service that allows you to send anyone an e-mail message without the recipient knowing who sent the message. A person who may not want their identity to be known may send a message to someone through an anonymous remailer who, in turn, will assign them a different e-mail address through them. After assigning this new address, the remailer then sends the message to the intended recipient. If the recipient chooses to respond, they would send their message to the remailer, who would then relay the message to the anonymous party. The only problem with anonymous remailers is finding one that can be completely trusted. Other more extreme security measures have recently been developed. Biometric systems use physical characteristics unique to each individual to grant-or deny- access to computer resources. These ...

< Prev Page 6 of 11 Next >

    More on Computer Crime and Ethics...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA