Computer crime has been defined as, "Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data." The purpose of this work is to examine breaches in computer security. As a future IT professional, with the possibility of being in charge of protecting the security of a database, it is relevant to take a "hacker approach" to security. Effective security is no matter where one goes fundamentally the same. Successful fundamental security practices are universal, crossing all arenas of computer usage whether it is in the nonprofit sector, government, or for personal use. Times change, technology moves forward, cultures vary from place yet there is no magic bullet that will protect ones system from every possible hack. The road to effective security can take many different paths, not one right path. Organizations with different missions, different hardware and different software remain secure not because of a particular version of a firewall or practices is superior, but because they use a strategy involving a defense in depth and are prepared for an ever changing computer attack. Any business or individual that uses the Internet is attaching its computer system to an immense network. This exposes hard drives to intruders and peoples personal behavior to snoopers. Security threats increase as computers become more connected with one another and tools that automate attacks make hacking easier. In addition, as businesses become more dependent on e-commerce, there is more to lose.
II. Problem Definition
Organizations are falling victim to intrusion through vulnerabilities that exist in their infrastructures and through security holes in software. Some common examples involving security breaches as stated by Hack Proofing Your Network: · Denial-of-Service
· Information Leakage
· File Creation, Reading, Modification, Removal
· Special File/Database Access
· Elevation of Privileges
· Session Hijacking
· Buffer Overflow
· Macro Virus
· Trojan Horses
· Melissa and I Love You
III. Background Statement
A global survey of 4,900 Information Technology professionals across 30 nations, conducted by InformationWeek Research and fielded by PricewaterhouseCoopers LLP, released on July 10th of last year, estimates that some 50,000 firms in the U.S. are sufficiently large enough to be impacted by and accurately tally up the cost of a software virus. In total, the bill to these U.S. firms this year for viruses and computer hacking will amount to $266 billion, or more than 2.5% of the nation's Gross Domestic Product (GDP). The price tag worldwide soars to $1.6 trillion. According to John DiStefano, principal researcher on the study at Reality Research& Consulting, which assisted InformationWeek Research on the project, the $266 billion figure represents the impact of viruses on U.S. businesses with more than 1,000 employees, or about 50,000 firms. "These are companies with infrastructures of IT professionals who, because of the dollar impact, are increasingly tracking the problem and can provide an accurate assessment of the scope of the issue. In reality, the true impact of viruses on U.S. business, including medium-sized companies and small businesses, is much greater," DiStefano explained. DiStefano went on to explain that the key costs involved in correcting IT systems infected by a virus are found in lost productivity as a result of downtime for the computer systems, as well as lost sales opportunities. In North America technology professionals this year will suffer system downtime of 3.24%, while downtime rises to 3.28% on a worldwide basis. To look at the impact another way, the study found that this year alone 6,882 and 39,363...
Please join StudyMode to read the full document