Subject: Management Information System
Any criminal offense that makes use of computer technology for their protection or investigation is referred to as a computer crime. It's difficult to gauge the scope of the computer crime problem (how many systems are compromised? How many persons are involved or how much damage is done overall? Theft of a vital piece of personal information, such as a credit card number, social security number, or diving license number, is known as identity theft. An internal threat is a security issue that originates from within a business. Employees have access to confidential information, and even in the presence of internal security measures, they frequently have free reign to move around a system without being seen.
According to the definition, it includes "Any criminal offense including the use of computer technology for the victim's protection or inquiry." The size of the computer crime problem (how many compromised systems are there? How many people are involved, or how much overall harm is done?
A skilled and knowledgeable computer user commits an act of computer crime. An individual who steals or browses confidential data or information from a company or an individual is known as a hacker. This person or group of persons (individuals) may act intentionally in some cases and damage or corrupt the computer or data files.
The rapid advancement of information technology has led to a daily occurrence of numerous types of computer crimes. Here's a quick breakdown of a couple of them:
Identity theft has increased in importance with the development of the internet and e-commerce. Theft of a vital piece of personal information, such as a credit card number, social security number, or diving license number, is known as identity theft. The data may be used to obtain credit goods or services in the victim's name or to provide the thief a false identity.
Phishing
Click-Fraud
It is described as an internal corporate security issue. Employees have access to confidential information, and even in the presence of internal security measures, they frequently have free reign to move around a system without being seen.
Intruders looking to gain access to systems may pose as legitimate employees in need of information in order to deceive staff into disclosing their passwords. Social engineering is the practice behind this.
A software vulnerability is a security hole, weak spot, or malfunction that has been discovered in an operating system (OS) or a piece of software and raises security questions. A buffer overflow is an illustration of a software fault. When users open a file that may be "too heavy" for the application to read, the software may crash or become unresponsive in this manner.
Despite the fact that revenue growth is closely tied to the investment in security and control. The company should invest in security and control. The operation of the firm depends so much on the protection of the information system. Businesses must safeguard their highly valuable information assets. Frequently, systems contain private data on a person's taxes, wealth, health, and evaluation of their work performance. The system may also include data on business operations, such as trade secrets, plans for developing new products, and marketing tactics. Control and security could expose you to significant legal liability. Businesses must safeguard all of their information assets, including those of their clients, staff members, and business partners.
On computer storage media, electronic evidence is kept in a type of data called ambient data that is hidden from the normal user. This information can be found in virtual memory files, file slack, unallocated clusters, and other locations that aren't used by active flies. Take the deletion of a file from a computer's hard drive as an example.
Reference
Laudon, Laudon, "Management Information Systems Managing the Digital Firm", twelfth edition
Electronic Evidence
Computer Forensic
Ambient Data
© 2021 Saralmind. All Rights Reserved.