The Computer Revolution/Internet/Crime


The main Internet security concerns are the computer crimes committed through either gaining unauthorized access (hacking, war driving, interception of communication) or through unauthorized use(using the computer for unauthorized activities).

Some of the measures taken to protect against unauthorized access and use are the use of Access control systems: possessed knowledge access systems (passwords, PINs), possessed object access systems (smart cards, badges, magnetic cards), biometric access systems (using biological characteristics) and controlling access to wireless networks.

On top on these tools, some other measures can be taken to prevent illegal access to a computer such as using firewalls, encryption, VPN’s.

Another type of crime is the computer sabotage using malware (viruses, worms, Trojan horses, mobile malware), denial of service attacks and Data/Program/site alterations. The best methods to protect against computer sabotage is by using security software.

The third type of crime is online theft/fraud by which data, information and money are being stolen. The most common crime in this category is Identity theft often enabled by phishing and pharming. The best measures to protect against theft/fraud are to guard personal info, use credit cards for online purchases, avoid clicking on links in e-mail messages to update personal info.


SpamEdit

Unsolicited e-mail that an individual does not want and doesn't have the time to read. It is unavoidable because of online transactions. Nowadays people are involved in many online activities which helps spam to get into an email address. It is always in the form of bulk mail. It can help virus to enter into the computer. We should never open any unknown email in order to protect our computer from all threats. There are different forms of spam such as web based spam and email based spam. E-mail spam enters through email addresses and web based spam can enter in different ways like when we visit some web sites the message box pops up and ask to register for some online activities for free. It is usually in the form of advertising or chain letters, junk mail, ads, and other un-wanted materials.

Spam filters are available for those who do not want to receive spam.

It is important to reject or ignore spam by:

  • delete immediately without opening it. (No peeking)
  • It is a bad idea to respond to the spam. (It could cause you VIRUSES or steal your money!)
  • Opt out! (no means no. Say no to spam)
  • When in doubt always ask for help. Ask your internet access provider. And get a spam filter (if you know what's good for you)
  • Stop the Spam Bully Now! Fight back. email www.abuse.net No one needs to get sand (oops I mean spam) kicked in their face.

Software Piracy

Software piracy is the illegal reproduction or copying of a computer program, typically with the intent of redistributing or selling to other users. In 2009 a report from the Business Software Alliance (BSA) stated that about 41% of all software in use on personal computers is installed illegally (Deborah Morley, Charles S. Parker. The Understanding Computers Today and Tomorrow 13th Editions. Boston: Course Technology, 2011. Page 603). Software Piracy includes DVD’s, CD’s and programs. There are also several sites that use Torrent files that can be downloaded and share with other users.

Pirate Bay is one of the most popular sites that is used for downloading illegally copied software.

Torrents

A Torrent file isn’t actually a file itself but is a collection of locations where pieces of the file can be obtained. This allows a user to download large files at an extremely fast rate by downloading several piece of the file from different sources. One of the most popular sites that is located in Sweden is called Pirate Bay. Pirate Bay provides millions of torrents that include operating systems, movies, books, music albums and all types of programs for free. Pirate Bay is just one of several sites available to access Illegal software and they all reside in countries that do not have anti-piracy laws in place. Although Majority of ISP providers do log and monitor this illegal activity there are several ways to avoid being caught using these sites to download Torrents (BitTorrent and µTorrent Software Surpass 150 Million User Milestone". Bittorrent.com. 2012-01-09. http://www.bittorrent.com/intl/es/company/about/ces_2012_150m_users. Retrieved 2012-29-11).

Last modified on 11 December 2012, at 04:43