Computer Fraud and Abuse Act
Information technology and related systems provide multiple benefits to business, government, and individual users. Databases, Internet transactions, and emails contain sensitive customers, employee and operations data that are extremely vulnerable. The following study focuses on various components of IT and related systems used for the storage of information like computers, servers, and website databases. Whilst identifying the ways the date can be compromised and exposed to abuse, the study identifies ways of protecting and enhancing their integrity.
Types of information systems that that hold data
Computers
Computers do their primary work in parts that are not visible when using them. To do this, a control center that converts data input to output must be present. All this functions are done by the central processing unit (CPU) a highly complicated set of electric circuits that intertwine to store and achieve program instructions. Most computers regardless of the size must contain a central processing unit. The CPU consists of two units that are the control unit and the arithmetic also known as a logical unit. Moreover, the computer's memory holds data for a short period when it executes a program. The control unit uses electric signals that run the entire systems. Furthermore, it does not perform the instructions but it guides the other parts of the systems to do so. Communication between the CPU must be with both the logical and memory units (Adikesavan, 2014).
The logical unit has electrical circuits to implement all the logical and arithmetic operations. Moreover, it performs four functions that include mathematical calculations such as multiplication, addition, subtraction, and division. This unit relates numerals, letters or other special characters justify why we can know the presence of empty seats in an airplane and credit card expiry and the number of votes in an opinion poll. Memory is the main attribute of a computer. A number of names such as internal storage, main memory, and RAM (Random Access Memory) associate it (Vacca, 2009).
Server
It is a computer program that provides facilitates another computer program within the computer and other computers of the same. It stores a lot of information more than the PC. It must be protected at all times from malicious attacks and other vulnerabilities.
Website databases
All websites have databases that stores various information about the users. Depending on the assigned bandwidth, the storage capacity is often high and keeps information as stipulated by W3C protocols. The use of cookies makes it ideal and flexible but predisposes it to attacks like DoS among others (Vacca, 2009).
Identify the threats, vulnerabilities, and ways hackers access these systems and your data
Hackers can access data through various ways. These are possible since there are many factors that make these possible. These threats include data opening from poor networking picks. Moreover, this is possible from the fact that many employees are fond of visiting sites that spread spyware. Examples of these sites are celebrity sites that give updates on their day-to-day lives. Casual gaming sites involving strangers from different places around the globe. In addition to that, there are porn sites and social media sites including MySpace and Facebook. Employees with interests in all this invite spyware. Advanced persistent threats are usually opportunistic because they seek any victim instead of a specific function (Schiller & Binkley, 2011).
Adware are softwares used to display advertisements and popups in computers when using certain applications. Such advertisements are useful, free and are common in Android phones. They are problematic when they randomly installed in the computer without one's knowledge. After this, they appear in other unrelated applications. Moreover, they take over the browser and continue to display mare ads. Adware gathers data from web browsing without the user's accord. Besides, it is difficult to uninstall. More effects include slow operating of the PC, slowing of the Internet connection while downloading the adverts. Lower the stability of the computer while programming. Adwares are unaffected by antivirus since they cannot be removed from the computer. Auto run worm is a malicious program that overwrites the windows auto run feature.
They operate automatically when the device stored in plugged to the computer. They are common with USB drivers and are effective immediately the device is plugged to it. Similar to autorun is the auto play feature. In order to counter this, Microsoft has come...
Computer Fraud and Abuse Act A failed and flawed law Technology has changed faster than the laws that exist to protect the public. Protecting information, particularly sensitive government information, was thought to be challenging and to pose additional dilemmas in terms of its regulation. With this in mind, Congress passed the Computer Fraud and Abuse Act in 1984. The CFAA "outlaws conduct that victimizes computer systems. It is a cyber-security law. It
Computer Fraud and Abuse Act was enacted into law in 1986 to deal with the hacking of computer systems operated by the American government and certain financial institutions. Through its enactment, the legislation made it a federal offense to access a protected computer without authorization or to an extent that is beyond the authorized access. However, since it was passed into law, the act has been amended severally in attempts
Computer Crime As computers and the Internet continue to grow in popularity and the world turns toward globalization, computer crime has quickly become a major concern for businesses, government agencies and individuals. Computer crimes affect millions of people and cost millions of dollars every day (Wasik, 1990). The victims of computer crimes range from individuals and schools to corporate businesses and government agencies. In this day and age, it seems as though
These attacks result in billions of dollars in damage to the United States and other global economies. Although technology is becoming more secure, cybercrime has increased as Internet use has risen. In fact, according to the Computer Emergency Response Team (CERT) Coordination Center at Carnegie Mellon University, the number of cybersecurity incidents more than doubled to nearly 53,000 last year. In the first three months of 2002 alone, CERT counted
Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration
Essay Topic Examples 1. The Evolution and Impact of Computer Viruses on Cybersecurity: This essay explores the history of computer viruses, detailing their progression from simple self-replicating programs to complex malware that can cause significant damage to digital infrastructure, steal sensitive data, and compromise personal information. It discusses the impacts on individuals, businesses, and governments, and the growing importance of robust cybersecurity measures. 2. Cyber Fraud and Its Effect on the Global Economy: The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now