Paper Details  
 
   

Has Bibliography
13 Pages
3167 Words

 
   
   
    Filter Topics  
 
     
   
 

The Growing Threat of Computer Crime

ction (NID), NFR Secure Log Repository (SLR) and NFR Host Intrusion Detection (HID). NID monitors networks and subnets and raises alerts when known attacks and anomalous activity are detected. NFR SLR is NFR’s secure log storage and management systems, NFR HID monitors servers and workstations and raises alerts when known attacks and anomalous activity are detected. There are also programs available that will protect your home computer from security breaches caused by hackers. One such program is called Freedom Internet Privacy Suite 2.0. Standard features include a personal firewall (especially for those with DSL and cable modems), form filler (to speed up and secure online registrations and transactions), cookie manager (to prevent websites from tracking your activities), ad manager (controls ads and speed up browsing), keyword alert (to prevent personal information from leaving your computer), as well as offering untraceable encrypted email (to secure and privatize your email) and anonymous browsing and chat (to go online undetected). Unfortunately, most computer crimes are discovered by chance, particularly in small businesses.Some means of detection include suspicious employees, physical inventory shortages detected by an audit, an error made by a greedy associate, an employee living a lifestyle obviously beyond what could be supported by his income and other resources, and disgruntled employees. Hiring and firing practices, effective employee training, and managing disgruntled employees properly can help make crime less likely to occur. Most people imagine a “hacker” as an anonymous cyber-intruder writing endless lines of code to penetrate a system from outside. But half of the unauthorized system intrusions involve insiders who have, or had legitimate access to the system. In addition, hacking has entered the mainstream, spurred by downloadable “hacking tools” that can enable even compute...

< Prev Page 7 of 13 Next >

    More on The Growing Threat of Computer Crime...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA