As the use of nurture processing systems has increased by individuals, corporations and governments, the security threat to computer systems has similarly increased. Daily on that point are news reports some hackers, cyber terrorist, and cyber criminals that have infiltrated computer systems, stealing valuable information. In a recent article, the problem of identity theft in the provoke together States has forced the U.S.

Senate to pass a cybercrime appoint that would allow prosecutors to go after criminals who threaten to take or release information from computers with cyberextortion, and it would allow prosecutors to charge cybercriminals with conspiracy to commit a cybercrime. (Gross, 2007). This bill will also allow the victims of online identity theft schemes to set about restitution from criminals and expands the definition of cyberextortion. As governments wrestle with the legality of cybercrime issues, there is a vast army of IT professionals combating the issue of computer security on a daily basis. As in all battle, it is best to know your enemy. The enemy is the computer security threat, cognize the threat is the key to victory.
The greatest threat when using Microsoft Windows is also it greatest strength (Boyleston, personal interview, December 12,...If you want to get a full essay, order it on our website: Orderessay
If you want to get a full essay, wisit our page: write my essay .
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.