Alisha Naaz http://vualisha.blogspot.com E-mail: vualisha@gmail.com

......Indian Songs.......

>

Monday, February 8, 2010

CS101 assignment #4 solution

Computer Crime - Definitions
Computer crime includes traditional criminal acts committed with a computer, as well as new offenses that lack any parallels with non-computer crimes. The diversity of offenses renders any narrow definition unworkable. The U.S. Department of Justice (DOJ) broadly defines computer crimes as "any violations of criminal law that involve a knowledge of computer technology for their perpetration…


Types of computer crimes:-


• Phishing: This is a common computer crime is the United States. Here emails are sent to gullible users that make them believe that the emails are from authentic sites. The users are passed onto fake websites where they enter their confidential data like usernames, passwords and credit card details. The fake websites look and feel real and that is why many people get fooled into entering sensitive information.
• Identity Theft: This one of the most serious frauds in today's word. It involves stealing money and getting benefits by using an identity of another person. This also includes the use of someone else's credit card details to purchase good and services. It has been seen that blackmail and terrorism often employ identity theft.
The methods that can be used to minimize the ill effects of listed crimes:


In an uncertain world, the best ways is to use Cyberterrorism Preventions Lists that are based on research. Barbara Fedock

Here are some suggestions:
1) If our systems use MAC addresses, it is very easy for terrorist to change a MAC address on a system to gain entry.
2) If a system relies on WEP to protect data, do not rely on WEP. It is open to compromise.
3) If our systems use default configuration files, change the default SSID to something that is very hard to guess.
4) If the Telecenter does not use a strong user authentication, implement an authentication system that mandates that both computers and users be authenticated before they can use wireless resources.
5) We might want to encrypt data. Encrypted data is difficult to access.
6) We should examine how we are monitoring wireless LAns for hijackers. Audits might be needed, as well as tools that ensure that only authenticated users and systems are using our wireless networks.
7) We should make sure that wireless traffic is controlled and away from sensitive systems or wired LANS.
Dear friends this is only an idea solution plz do not copy it. Try yourselves to solve this assignment.

0 comments:

Searching Video

Vu Alisha Search

VUalisha Followers (Jion Now and Get Extra benefits)

Contact Us

My photo
E-mail: vualisha@gmail.com