AIS-IN01_Raj_Bharaj_Computer_Crime

advertisement
Here is some computer crime small businesses need to know.
 Here are uses of or the conspiracy to use computer resources to commit a
felony
 There is unauthorized theft, use, Access, Modification, copying or
destruction software or data.

Theft of Money by altering computer records or the theft of computer time.
Like computer programmers can use the salami technique to steal small
amounts of money from many accounts over a period of time

Theft, Vandalism, or Destruction of computer hardware.

Intent to illegally obtain information or tangible property through the use of
computers .i.e. Fraud can do data diddling means changing data before,
during or after they are entered in the computer. If it is not protected
properly.

Trafficking in the passwords or other log in information for accessing a
computer
A major class of computer crime involves
 Hacking: where computer file become accessible to unauthorized user
 Computer virus: A computer virus is an attachment to other files or
programs that effect computer file.
 Computer worm: Don’t actually destroy data but merely replicate them
repeatedly until the user runs out of internal memory.
Here is some procedural control Don should be aware of while dealing with
computer applications.






Use computer passwords to thwart unauthorized user form accessing the
restaurant operating systems and files.
Educate employees about viruses and load antivirus software onto the
hard disk .and keeps it current. There are other security technologies
used like firewalls, Access control Physical security, intrusion detection
systems etc.
Have an approved and tested disaster recovery plan. Such a plan is
necessary because a variety of unforeseen disasters could occur.
. Maintain complete backup files.
Since he has two restaurants, it is good idea to transmit all the important
documents electronically from the backup tapes to other restaurant
(located in West Chester and vice verse) computer through electronic
vaulting in case of any disaster.
Don should identify and evaluate assets i.e. what asset needs to be
protected.


Assess risk loss of data privacy legal liability, loss of customers etc.
Assign responsibility
References
Bagranoff, Nancy A, Mark G Simkin, and Carolyn Stand Norman. Core Concept
of Accounting Information System. 9TH ed. New Jersey. John Willy and Sons,
inc.2005
Excel User Tip
<http://j- Walk.com/ss/excel/usertips/tip022.htm
Download