fraud. Other targets are systems that control access to any resources, such as time and attendance systems, inventory systems, school grading systems, or long-distance telephone systems.
Insiders or outsiders can commit fraud. Insiders who are authorized users of a system perpetrate the majority of fraud uncovered on computer systems. Since insiders have both access to and familiarity with the victim computer system, including what resources it controls and where the flaws are, authorized system users are in a better position to commit crimes. An organization's former employees may also pose threats, particularly if their access is not terminated promptly.
Because many computers are relatively small and valuable, they are easy to steal and sell. An organization should attempt to protect its investment in equipment with physical measures such as locks and bolts. If the computer is stolen, the information it contains will be at the disposal of the perpetrator. The thief may erase it or may be able to read it. The thief could sell sensitive information, use it for blackmail, or use it to compromise other computer systems. You can never make something impossible to steal, but you can make stolen information virtually useless by making sure the information is encrypted and the thief does not have the key.
Data can be stolen from a computer or even manipulated without the owner's knowledge. A Zip drive can be connected to a computer's parallel port and several megabytes of data can be copied.
fraud. Other targets are systems that control access to any resources, such as time and attendance systems, inventory systems, school grading systems, or long-distance telephone systems.
Insiders or outsiders can commit fraud. Insiders who are authorized users of a system perpetrate the majority of fraud uncovered on computer systems. Since insiders have both access to and familiarity with the victim computer system, including what resources it controls and where the flaws are, authorized system users are in a better position to commit crimes. An organization's former employees may also pose threats, particularly if their access is not terminated promptly.
Because many computers are relatively small and valuable, they are easy to steal and sell. An organization should attempt to protect its investment in equipment with physical measures such as locks and bolts. If the computer is stolen, the information it contains will be at the disposal of the perpetrator. The thief may erase it or may be able to read it. The thief could sell sensitive information, use it for blackmail, or use it to compromise other computer systems. You can never make something impossible to steal, but you can make stolen information virtually useless by making sure the information is encrypted and the thief does not have the key.
Data can be stolen from a computer or even manipulated without the owner's knowledge. A Zip drive can be connected to a computer's parallel port and several megabytes of data can be copied.
การแปล กรุณารอสักครู่..