The History Of Computer Dependent Age

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

Computers….computers….computers……!.any were and every were we can see them..

These computers have become interrelated and inter dependent on every class of people elite to down class. As all are updating with the incoming technology now a day’s computer had became one of the most used equipment by everyone, it has become part and parcel of everyone’s life.

Internet facilitated many things for the many people for the growth of people both as per knowledge and financially(e-commerce)…In today’s world computers and internet are used for the development as well as for the destruction also…

But unfortunately so many are using internet as hackers-crackers for many unauthorized intrusion in to the secured information of the countries.

Ex: Hacking and cracking of military information of other countries

1.2 History of computer crimes:

It is hard to find when the first crime involving a computer actually took place. Since from the abacus the computer has been in one or the otheir form, which is known to exist in 3500BC in Japan, China, and India.

In 1801, profit motives encouraged Joseph Jacquard, a textile manufacturer in France, to design the forerunner of the computer card. This device allowed the repetition of services of stamps in the weaving of special fabrics. However Jacquard’s employees were committed to discourage further use of new technology.

1.3 Definition of computer crimes:

Computer crime generally means utilization or transmission of data illegally (unauthorized). It also refers to copy or manipulating ones data. In other scene using the computer or internet in order to do crime is known as computer crime. Computers are used in doing different types of crimes like:

Changing the destination account number while transferring money.

Manipulating the transferring data which was so important.

Transferring of goods to wrong destination by changing the destination address.

Generally however, it may be divided into two categories:

(1) crimes that target computers directly;

(2) crimes facilitated by computer networks or devices, the primary target of which is independent of the cats network or device.

Threats come in two categories:

Passive threats.

Active threats.

Passive threats:

This type of threads involve in manipulating the data that is transmitted between the organizations. These are very difficult to detect. Passive attack may be due to:

Release of message content.

traffic analysis.

Active threats:

These are some what easy to detect when compared with passive threats as these threats involve in modification of data or the creation of a false stream of data. These are of three types:

Modification.

Denial of message service.

Masquerade.

3.TYPES OF CYBER CRIMES:

Some of the most seen types of crimes using the computer are:

Hacking:

The term hacking refers to "utilization or profession of working with the computer" and also "breaking into computer systems". But now a day’s all are following the second one that is Attacking the computer network. Some are becoming professionals in hacking. Very few are using the process of hacking in the correct way.

Denial of service attacks:

Denial of service means "it was done for a group of computers connected to a network and the services are provided lately for the host systems connected to the server by the server". This type of attack occur or caused by the hacker intentionally by sending more request to the server and making the important request to be waited in queue for a longer time.

Computer Forgery:

It is used for alteration of the data.It is done for making duplicate identities for the people. This are also used to create duplicate documents which will make no use of originals. The duplicates are created in such a way that they look similar as the original. It is very difficult to distinguish between them as the color forgery was also done for the documents

Damage to Data/Programs:

This category of criminal activity involves either direct or search unauthorized access to computer system by introducing new programs known as viruses, worms or logic bombs. The unauthorized modification suppression or erasure of computer data or functions with the Internet to hinder normal functioning of the system is clearly a criminal activity and is commonly referred to as computer sabotage.

VIRUS: (Vital information resources under seize).

A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.

. PRECAUTIONS TO PREVENT COMPUTER HACKING:

Nobody’s computer will be safe or secured unless they follow some of the they use some of them like:

3.1 Firewalls:

A fire wall acts as a gate way in the networking system to decide whether to allow the data to be transmitted or not by following some of the predetermined rule set. It acts as an software and hardware in order to keep the data secured between the computer and Internet. Its allows the data only from the known location and ignores data coming from an unknown location.

3.2 Password protection:

Every activity should be password protected in order that the unauthorized person can’t access it. Even your pc should be password protected. And the password should be kept in a very though manner so that any one cant guess that. Should not use your childhood names, nick names, date of birth etc.. Generally password length should be more than 6 characters. Password is case sensitive…we can use both uppercase and lowercase letters. A strong password may contain Symbols and numbers.

3.3 Viruses:

A virus is small piece of code that may be produced in our computer without your knowledge.

That manipulates and copy the data and make your system halt.

Most virus protection utilities now bundle anti-spyware and anti-malware capabilities to go along with anti-virus protection. Internet security suites go a step further by including additional capabilities like anti-spam, anti-phishing, firewall, file protection and PC optimization.

3.4 Encryption:

The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.

There are two main types of encryption: asymmetric encryption (also calledpublic-key encryption) and symmetric encryption.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now