What is cyber crimes with ethically related challenges?
Answers
Answered by
3
criminal activities carried out by means of computers or the Internet.
1. Capacity to store data in comparatively small space:-
The computer has a unique characteristic of storing data in a very small space. This allows for much easier access or removal of information through either physical or virtual media.
2.Easy to access:-
The problems encountered in guarding a computer system from unauthorised access are that there is every possibility of unauthorised access not due to human error but due to the complex technology. By secretly implanted a logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilised to get past many security systems.
3.Complex-
The computers work on operating systems and these operating systems in turn are composed of millions of lines of code. The human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system using often more sophisticated means than originally anticipated by the systems engineers.
4. Negligence:-
Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system. This negligence is usually a property of under resourced IT security provisions and the improvement of security barriers within software packages and network structures could lead to improved security.
5. Loss of evidence:-
Loss of evidence is a very common & obvious problem as all the data is routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
1. Capacity to store data in comparatively small space:-
The computer has a unique characteristic of storing data in a very small space. This allows for much easier access or removal of information through either physical or virtual media.
2.Easy to access:-
The problems encountered in guarding a computer system from unauthorised access are that there is every possibility of unauthorised access not due to human error but due to the complex technology. By secretly implanted a logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilised to get past many security systems.
3.Complex-
The computers work on operating systems and these operating systems in turn are composed of millions of lines of code. The human mind is fallible and it is not possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system using often more sophisticated means than originally anticipated by the systems engineers.
4. Negligence:-
Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system. This negligence is usually a property of under resourced IT security provisions and the improvement of security barriers within software packages and network structures could lead to improved security.
5. Loss of evidence:-
Loss of evidence is a very common & obvious problem as all the data is routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation.
Similar questions