Paper Details  
 
   

Has Bibliography
11 Pages
2748 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime and Ethics

ity for one's computer or network, there are many things to consider. Determine the threats. If the system is in danger, then estimate the danger of each threat. Determine the consequences from each threat. Identify controls against each threat. If threats are internal, take appropriate measures to protect the system from employees. If threats are external, determine if the possible losses from an acted out threat cost more than a control system. Sensitive data should be controlled. Therefore, confidential documents should be shredded before being discarded. Access to computer terminals should be restricted. Another possibility is the implementation of alarms, closed circuit televisions, and access cards. And, very importantly, when transmitting data, encrypt it.Although computers have become an important part of everyday life, with the widespread use of computers comes one more way we can be victimized by criminals. Although no security measure is fool proof, steps can be taken to reduce the chances of becoming a victim of fraud. Be aware of computer crimes and take the necessary precautions to protect yourself and your work....

< Prev Page 9 of 11 Next >

    More on Computer Crime and Ethics...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA