Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Computer Crime, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
Deleting files from computers is often the most effective way to remove undesirable or sensitive information. Computer and Internet users delete their files in thousands and even format their hard drives. However, neither of these actions can remove the files permanently. The fact is in that no matter how well users may seek to wipe out the information from the hard drive, they will leave numerous bits of sensitive information in the remote corners of their computer system. These bits of information readily become the objects of the computer crime and the sources of additional, criminal profits. Today, dozens of IT companies provide users with access to software which, as they claim, will delete all files permanently without leaving a trace. Computer users must have a better knowledge of the basic computer and software processes and use effective secure wiping solutions, to ensure that they destroy all sensitive information without a trace.
The law defines data as:
“the representation of information, facts, knowledge, concepts, or instructions prepared in a formalized or other manner and intended for use in a computer, computer system, or computer network. Data may be embodied in any form including computer printouts, magnetic storage media, optical storage media, and punch cards, or may be stored internally in memory of a computer.” (Peikari, & Chivakin 81)
The data stored internally in memory of a computer present one of the most serious problems. More specifically, the process of deleting information poses a serious threat to computer users. The information they choose to delete from their hard drive is rarely or never removed completely. This information easily turns into an attractive computer crime target.
Simple “deleting” procedures do not guarantee that the file is entirely removed from the system (Casey 203). Casey writes (and Blyth and Kovacich support his assumptions) that even the format command does not guarantee that users have erased the data from the operating system – a whole range of tools and software solutions exist and can restore the data from a hard drive after it had been formatted (203). It would be fair to compare a hard drive to a library, where formatting resembles the act of destroying a library catalogue: regardless of the value of the catalogue itself, all books remain on the shelves (Blyth & Kovacich 140). As a result, anyone searching for a book will eventually find it; the only problem is that it will simply take more time (Blyth & Kovacich 140).
Modern information systems and Windows-based operating systems, in particular, “smear information detritus all over the hard drive” (Peikari & Chuvakin 480). As a result, theft becomes an easy way to access and use private information, which was left after deleting or even formatting the hard drive. Today, system attack and privilege escalation are the two most common forms of computer crime which are difficult to detect but which successfully access and use the detritus left on the hard drive. Privilege escalation is accessing file systems through effective exploitation of particular applications and services that run at higher levels of privilege than intended for normal access (Tipton & Krause 89). In this way, attackers acquire unlimited access to computer file systems and can successfully restore and use the data that had been deleted by users (Tipton & Krause 89). To reduce the threat of the unauthorized access to computer hard drives, users must (a) know that deleted files are not removed permanently; and (b) use software solutions, which help to wipe out the files and data without a trace. It should be noted, that most advertised wiping tools follow the same wiping methodologies, which even the simplest operational systems offer to users, and they are not as thorough as to destroy all information (Davis 128). Here, users can apply to PGP Wipe and BC Wipe technologies, which will overwrite every bit of the disk and will allow users to wipe only deleted portions of the disk (Davis 128). In any case, users must use secure wiping utilities to make sure that they do not leave the signs of sensitive data on their hard drives.
Conclusion
That users delete files from their computers does not necessarily mean that these files are entirely removed from the system. Even formatting does not guarantee that files are destroyed forever. In reality, the computer file system is designed in ways which resemble a library – by deleting files, users delete only the library catalogue but leave all books on the shelves. To reduce the probability of computer crime, users must know that they cannot remove files completely, and must apply to the benefits of secure wiping software, which will help them to get rid of the sensitive data without leaving a trace on their hard drive.
Works Cited
Blyth, A. & Kovacich, G.L. Information Communication: Surviving the Information Environment. Springer, 2001.
Casey, E. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press, 2004.
Davies, C. Hacking Exposed Computer Forensics: Secrets and Solutions. McGraw-Hill Professional.
Peikari, C. & Chuvakin, A. Security Warrior. O’Reilly Media, 2004.
Tipton, H.F. & Krause, M. Information Security Management Handbook. CRC Press, 2006.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee