preview

Computer Theft Research Paper

Satisfactory Essays

Differences between computer theft and computer fraud?

Computer theft is the unauthorized taking or interception of computer-based information. Moreover, data theft is the act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information.

Computer fraud is any act using computers, the Internet, Internet devices, and Internet services to defraud people, companies, or government agencies of money, revenue, or Internet access. There are many methods used to perform these illegal activities; the most utilized are phishing and viruses.
Phishing is a term used to describe the malicious actions of an individual or group to scam computer users. They do so by sending e-mails or by creating fake web pages that are …show more content…

Control computer access with tools such as stronger expiring passwords and pin numbers.

2. Information will be encrypted, so it cannot be read or understood. Information will be decrypted only by authorized individuals.

3. Assigned permissions; personnel will have their unique attributes of access to information and rules of use to ensure information.

4. Network Policies for disclosure or transmission of sensitive information; the ability to safeguard information depends on implementing and strengthening policies and procedures that enable network monitoring and detection of atypical actions to identify insider threats and intrusions.

5. Control of data and automated monitoring, paired with appropriate privacy protection and continuous monitoring will safeguard information in systems and networks.

6. Promote agency wide Accountability and Compliance; Activity must be continuously reinforced and assessed, including monitoring of access and use of information.

7. Establish an information sharing processes with specific protocols with other agencies and the

Get Access