Vous êtes sur la page 1sur 6

Computer Waste unintegrated information Training is another key aspect of

systems, which make it difficult for decisions implementation. Many users are not properly
makers to collaborate and share information. trained in using applications, and their mistakes
can be very costly.
Computer-Related Mistakes caused by unclear
expectations coupled with inadequate training Computer training helps to ensure acceptance
and a lack of feedback and implementation of policies and procedures.
.
PREVENTING COMPUTER-RELATED WASTE AND Monitoring Policies and Procedures To ensure
MISTAKES organizations must use all resources that users throughout an organization are
wisely. following established procedures, the next step
is to monitor routine practices and take
Establishing Policies and Procedures The first corrective action if necessary
step to prevent computer-related waste is to
establish policies and procedures regarding Reviewing Policies and Procedures The final
efficient acquisition, use, and disposal of step is to review existing policies and
systems and devices. procedures and determine whether they are
adequate
Prevention of computer-related mistakes
Data-entry or data-capture errors This review and planning allows companies to
Errors in computer programs take a proactive approach to problem solving,
Errors in handling files, including formatting a which can enhance a companys performance,
disk by mistake, copying an old file over a newer such as increasing productivity and improving
one, and deleting a file by mistake customer service.
Mishandling of computer output
Inadequate planning for and control of COMPUTER CRIME is less dangerous as a
equipment malfunctions computer criminal with the right equipment and
Inadequate planning for and control of know-how can steal large amounts of money
environmental difficulties (e.g., electrical and without leaving his or her home.
humidity problems)
Installing computing capacity inadequate for Internet Crime Computer Center : An alliance
the level of activity between the White Collar Crime Center and the
Failure to provide access to the most current Federal Bureau of Investigation that provides a
information by not adding new Web links and central site for Internet crime victims to report
not deleting old links and to alert appropriate agencies of crimes
committed.
Preventing computer-related mistakes begins
by identifying the most common types of errors. Computer crime Computer crime is a serious
and growing global concern.
Computer usage policies Organizations
establish polices to keep employees from THE COMPUTER AS A TOOL TO COMMIT CRIME
wasting time. A computer can be used as a tool to gain access
to valuable information and as the means to
Implementing Policies and Procedures steal millions of dollars.
Implementing policies and procedures to
minimize waste and mistakes varies according to social engineering: Using social skills to get
the business conducted. computer users to provide information that
allows a hacker to access an information system
or its data. a critical computer password has information systems used by law enforcement
been talked out of a person. to recover stolen property

dumpster diving: Going through the trash of an Monitoring Criminals JusticeXchange is a Web-
organization to find secret or confidential based data sharing system that places millions
information, including information needed to of nationwide booking records at the fingertips
access an information system or its data. of law enforcement officials. The system makes
Identity thieves are not above searching an it easy to collaborate with other law
organizations trash to find confidential enforcement professionals to locate persons of
information. interest.

cyberterrorism: The intimidation of government Assessing Crime Risk for a Given Area The
or civilian population by using information ready availability of personal computers,
technology to disable critical national coupled with the development of mapping and
infrastructures (e.g., energy, transportation, analysis software,
telecommunications, banking and finance, law
enforcement, and emergency response) to Mapping crime risk A GIS helps law
achieve political, religious, or ideological goals. enforcement agencies track and even diminish
Cyberterrorism includes threats or attacks crime risks.
against a countrys critical infrastructure, such
as the air traffic control system. THE COMPUTER AS THE OBJECT OF CRIME Each
time system access is illegally obtained, data or
cyberterrorist: Someone who intimidates or computer equipment is stolen or destroyed, or
coerces a government or organization to software is illegally copied, the computer
advance his or her political or social objectives becomes the object of crime.
by launching computer-based attacks against
computers, networks, and the information Common methods used to commit computer
stored on them. crimes
-Add, delete, or change inputs to the computer
identify theft: A crime in which an imposter system = Delete records of absences from class
obtains key pieces of personal identification in a students school records.
information, such as Social Security or drivers -Modify or develop computer programs that
license numbers, to impersonate someone else. commit the crime. = Change a banks program
for calculating interest so it deposits rounded
Computer Theft Ploutus malware is designed to amounts in the criminals account.
steal money directly from ATM machines. -Alter or modify the data files used by the
computer system. = Change a students grade
THE COMPUTER AS A TOOL TO FIGHT CRIME from C to A
The computer is also used as a tool to fight -Operate the computer system in such a way as
computer crime. Information systems are used to commit computer crime. = Access a restricted
to fight crime in many ways, including helping government computer system.
recover stolen property, monitoring sex -Offer worthless products for sale over the
offenders, and helping to better understand and Internet = Send emails requesting money for
diminish crime risks. worthless hair growth product.

Recovery of Stolen Property The LeadsOnline Illegal Access and Use Crimes involving illegal
Web-based service system is one of several system access and use of computer services are
a concern to both government and business.
hacker: A person who enjoys computer another when the files are copied or shared.
technology and spends time learning and using Most viruses attach themselves to executable
computer systems. files, but some can target a master boot record,
autorun scripts, or Microsoft Office macros.
criminal hacker (cracker): A computer-savvy -Worm = A malicious program that spreads from
person who attempts to gain unauthorized or computer to computer, but unlike a virus, it can
illegal access to computer systems to steal spread without any human action. For example,
passwords, corrupt files and programs, or even a worm can send a copy of itself to everyone
transfer money. listed in your email address book.

script bunny: A derogatory term for spyware: Software that is installed on a


inexperienced hackers who download programs personal computer to intercept or take partial
called scripts that automate the job of control of the users interaction with the
breaking into computers. computer without the knowledge or permission
of the user.
insider: An employee, disgruntled or otherwise,
working solo or in concert with outsiders to password sniffer: A small program hidden in a
compromise corporate systems. network or a computer system that records
identification numbers and passwords.
Insider threats The loss of Malaysia Airlines
Flight 370 may have been an inside crime. Protecting computers To fight computer crime,
many companies use devices that disable the
malware: Software programs that when loaded disk drive or lock the computer to the desk.
into a computer system will destroy, interrupt,
or cause errors in processing. software piracy: The act of unauthorized
copying, downloading, sharing, selling, or
Common types of computer malware installing of copyrighted software.
-Logic Bomb = A type of Trojan horse that
executes when specific conditions occur. digital rights management (DRM): Refers to the
Triggers for logic bombs can include a change in use of any of several technologies to enforce
a file by a particular series of keystrokes or at a policies for controlling access to digital media,
specific time or date. such as movies, music, and software.
-Rootkit = A set of programs that enables its
user to gain administrator level access to a Patent infringement Apple and Samsung are
computer or network. Once installed, the involved in a series of patent infringement legal
attacker can gain full control of the system and battles regarding the design of smartphones
even obscure the presence of the rootkit from and tablet computers.
legitimate system administrators.
-Trojan Horse = A malicious program that phishing: A form of computer scam that
disguises itself as a useful application or game attempts to get users to gain access to a
and purposefully does something the user does customers private information through a fake
not expect Web site.
-Variant = A modified version of a virus that is
produced by the viruss author or another vishing: A scam that attempts to steal an
person by amending the original virus code. individuals private information by having them
-Virus = A malicious program that copies itself call a phone number and enter personal data.
and infects a computer, spreading from one file
to another, and then from one computer to
smishing: A scam that attempts to steal an Top-rated antivirus software
individuals private information by having them -For Windows systems = Webroot Secure
respond to a text message. Anywhere Antivirus, Norton, Bitdefender,
Kaspersky, AVG, Malwarebytes
International Computer Crime Computer crime -For Mac systems = Kromtech MacKeeper,
becomes more complex when it crosses Intego Mac Internet Security, Kaspersky Internet
borders. Money laundering is the practice of Security for Mac, Norton Antivirus, Avira Free
disguising illegally gained funds so that they MacSecurity
seem legal.
Antivirus software should be used and updated
United States Computer Emergency Readiness often.
Team (US-CERT): Part of the Department of
Homeland Security that leads U.S. efforts to Privacy at Work The right to privacy at work is
improve the nations cybersecurity posture, also an important issue. Employers are using
coordinate cyber information sharing, and technology and corporate policies to manage
proactively manage cyber risks to the nation. worker productivity and protect the use of IS
resources.
separation of duties: The careful division of the
tasks and responsibilities associated with a key Email and work privacy Email has changed how
process so that they must be performed by workers and managers communicate in the
more than one person. same building or around the world. Email,
however, can be monitored and intercepted. As
Biometric smartphone Many new biometric ID with other services, such as cell phones, the
systems are being considered for use with convenience of email must be balanced with
smartphones the potential of privacy invasion.

intrusion detection system (IDS): Monitors Privacy and Instant Messaging Using instant
system and network resources and traffic and messaging (IM) to send and receive messages,
notifies network security personnel when it files, and images introduces the same privacy
senses a possible intrusion. issues associated with email

security dashboard: Software that provides a Privacy and Personal Sensing Devices RFID
comprehensive display on a single computer tags, essentially microchips with antenna, are
screen of all the vital data related to an embedded in many of the products we buy,
organizations security defenses, including from medicine containers, clothing, and books
threats, exposures, policy compliance and to computer printers, car keys, and tires.
incident alerts.
Privacy and the Internet Some people assume
managed security service providers (MSSPs): that there is no privacy on the Internet and that
Organizations that monitor, manage, and you use it at your own risk.
maintain network security for both hardware
and software for other organizations. Privacy and Internet Libel Concerns Libel
involves publishing an intentionally false written
antivirus program: Software that runs in the statement that is damaging to a persons or
background to protect your computer from organizations reputation.
dangers lurking on the Internet and other
possible sources of infected files. Corporate Privacy Policies Even though privacy
laws for private organizations are not very
restrictive, most organizations are sensitive to BBB recommends that a privacy notice includes
privacy issues and fairness. the following elements:80
Policy (what personal information is being
Individual Efforts to Protect Privacy Although collected on the site)
numerous state and federal laws deal with Choice (what options the customer has about
privacy, the laws do not completely protect how/whether his or her data is collected and
individual privacy. used)
Access (how a customer can see what data
Fairness Issues has been collected and change/correct it if
-The right to know necessary)
-The ability to decide Security (state how any data that is collected
Database Storage is stored/protected)
-Knowledge Redress (what a customer can do if the
-Control privacy policy is not met)
Database Usage Updates (how policy changes will be
-Notice communicated)
-Consent
Health Concerns Organizations can increase
Knowledge. Should people know what data is employee productivity by paying attention to
stored about them? In some cases, people are the health concerns in todays work
informed that information about them is stored environment.
in a corporate database. In others, they do not
know that their personal information is stored Avoiding Health and Environmental Problems
in corporate databases. Two primary causes of computer-related health
Control. Should people be able to correct errors problems are a poorly designed work
in corporate database systems? This ability is environment and failure to take regular breaks
possible with most organizations, although it to stretch the muscles and rest the eyes
can be difficult in some cases.
Notice. Should an organization that uses ergonomics: The science of designing machines,
personal data for a purpose other than the products, and systems to maximize the safety,
original purpose notify individuals in advance? comfort, and efficiency of the people who use
Most companies dont do this. them.
Consent. If information on people is to be used
for other purposes, should these people be Ergonomics Developing certain ergonomically
asked to give their consent before data on them correct habits can reduce the risk of adverse
is used? Many companies do not give people health effects when using a computer
the ability to decide if such information will be
sold or used for other purposes. The following is a useful checklist to help you
determine if you are properly seated at a
filtering software: Software that screens correctly positioned keyboard:81
Internet content. Your elbows are near your body in an open
angle to allow circulation to the lower arms and
Top-rated Internet filters hands
NetNanny Your arms are nearly perpendicular to the
McAfee Family Protection floor Your wrists are nearly straight
PureSight PC The height of the surface holding your
keyboard and mouse is 1 or 2 inches above your
thighs
Center the keyboard in front of your body.
The monitor is about one arms length (20 to
26 inches) away
The top of your monitor is at eye level
Your chair has a backrest that supports the
curve of your lower (lumbar) back

code of ethics: A code that states the principles


and core values that are essential to a set of
people and that, therefore, govern these
peoples behavior.

1. contribute to society and human well-being.


2. avoid harm to others.
3. be honest and trustworthy.
4. be fair and take action not to discriminate.
5. honor property rights including copyrights
and patents.
6. give proper credit for intellectual property.
7. respect the privacy of others.
8. honor confidentiality.

Vous aimerez peut-être aussi