The
bulk of research on computer security focuses on privacy, mainly
because most of the early research was funded by the military. In practice, as I said, the concept of "privacy" and "security" are used interchangeably. Computer security must be overcome, and many other new problems. Computer crimes are purchased in advanced telecommunications infrastructure is so widespread, that in order to deal with them in the criminal legislation have been introduced specific offenses.
How do companies ensure proper operation with a large database to which different people have different access? This problem can quickly become extremely complex. Only
a few people have the right to see information about the salary, even
fewer people need to see the entire set of data: the average salary,
health statistics, etc.
Recently, a new kind of crime - the introduction of computer viruses, which revealed more than three hundred. Privacy is not much different from the networks security, which we discussed in Chapter 5. Initially, computer security is understood as preventing unauthorized access to classified information. This
bias is partly dissipated with the advent of e-commerce transactions
and practices on the Internet - in this area much more important person,
- however, it remains in the development of most systems, computer
security. Published in the press the results of studies conducted by experts, allow an exemplary sociological portrait of the modern hacker.
Age offenders varies in wide limits - from 15 to 45 years, and at the time of the offense a third of the age did not exceed 20 years. Over 80% of offenders in the computer field - men, the absolute most of which had higher and secondary special education. However, according to statistics, professional programmers from each Thousands of computer crime is committed only seven. Motives crime - a variety: selfish reasons (66%), espionage, sabotage (17%), research interest (7%), disorderly conduct and mischief (5%), revenge (5%).
No comments:
Post a Comment