All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Computer Crime, Essay Example

Pages: 3

Words: 844

Essay

Introduction

Deleting files from computers is often the most effective way to remove undesirable or sensitive information. Computer and Internet users delete their files in thousands and even format their hard drives. However, neither of these actions can remove the files permanently. The fact is in that no matter how well users may seek to wipe out the information from the hard drive, they will leave numerous bits of sensitive information in the remote corners of their computer system. These bits of information readily become the objects of the computer crime and the sources of additional, criminal profits. Today, dozens of IT companies provide users with access to software which, as they claim, will delete all files permanently without leaving a trace. Computer users must have a better knowledge of the basic computer and software processes and use effective secure wiping solutions, to ensure that they destroy all sensitive information without a trace.

The law defines data as:

“the representation of information, facts, knowledge, concepts, or instructions prepared in a formalized or other manner and intended for use in a computer, computer system, or computer network. Data may be embodied in any form including computer printouts, magnetic storage media, optical storage media, and punch cards, or may be stored internally in memory of a computer.” (Peikari, & Chivakin 81)

The data stored internally in memory of a computer present one of the most serious problems. More specifically, the process of deleting information poses a serious threat to computer users. The information they choose to delete from their hard drive is rarely or never removed completely. This information easily turns into an attractive computer crime target.

Simple “deleting” procedures do not guarantee that the file is entirely removed from the system (Casey 203). Casey writes (and Blyth and Kovacich support his assumptions) that even the format command does not guarantee that users have erased the data from the operating system – a whole range of tools and software solutions exist and can restore the data from a hard drive after it had been formatted (203). It would be fair to compare a hard drive to a library, where formatting resembles the act of destroying a library catalogue: regardless of the value of the catalogue itself, all books remain on the shelves (Blyth & Kovacich 140). As a result, anyone searching for a book will eventually find it; the only problem is that it will simply take more time (Blyth & Kovacich 140).

Modern information systems and Windows-based operating systems, in particular, “smear information detritus all over the hard drive” (Peikari & Chuvakin 480). As a result, theft becomes an easy way to access and use private information, which was left after deleting or even formatting the hard drive. Today, system attack and privilege escalation are the two most common forms of computer crime which are difficult to detect but which successfully access and use the detritus left on the hard drive. Privilege escalation is accessing file systems through effective exploitation of particular applications and services that run at higher levels of privilege than intended for normal access (Tipton & Krause 89). In this way, attackers acquire unlimited access to computer file systems and can successfully restore and use the data that had been deleted by users (Tipton & Krause 89). To reduce the threat of the unauthorized access to computer hard drives, users must (a) know that deleted files are not removed permanently; and (b) use software solutions, which help to wipe out the files and data without a trace. It should be noted, that most advertised wiping tools follow the same wiping methodologies, which even the simplest operational systems offer to users, and they are not as thorough as to destroy all information (Davis 128). Here, users can apply to PGP Wipe and BC Wipe technologies, which will overwrite every bit of the disk and will allow users to wipe only deleted portions of the disk (Davis 128). In any case, users must use secure wiping utilities to make sure that they do not leave the signs of sensitive data on their hard drives.

Conclusion

That users delete files from their computers does not necessarily mean that these files are entirely removed from the system. Even formatting does not guarantee that files are destroyed forever. In reality, the computer file system is designed in ways which resemble a library – by deleting files, users delete only the library catalogue but leave all books on the shelves. To reduce the probability of computer crime, users must know that they cannot remove files completely, and must apply to the benefits of secure wiping software, which will help them to get rid of the sensitive data without leaving a trace on their hard drive.

Works Cited

Blyth, A. & Kovacich, G.L. Information Communication: Surviving the Information Environment. Springer, 2001.

Casey, E. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press, 2004.

Davies, C. Hacking Exposed Computer Forensics: Secrets and Solutions. McGraw-Hill Professional.

Peikari, C. & Chuvakin, A. Security Warrior. O’Reilly Media, 2004.

Tipton, H.F. & Krause, M. Information Security Management Handbook. CRC Press, 2006.

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay

Relatives, Essay Example

People have been bound by bloodline and kinship since times immemorial. This type of relation is much more complex than being simply unified by common [...]

Pages: 1

Words: 364

Essay

Voting as a Civic Responsibility, Essay Example

Voting is a process whereby individuals, such as an electorate or gathering, come together to make a choice or convey an opinion, typically after debates, [...]

Pages: 1

Words: 287

Essay

Utilitarianism and Its Applications, Essay Example

Maxim: Whenever I choose between two options, regardless of the consequences, I always choose the option that gives me the most pleasure. Universal Law: Whenever [...]

Pages: 1

Words: 356

Essay

The Age-Related Changes of the Older Person, Essay Example

Compare and contrast the age-related changes of the older person you interviewed and assessed with those identified in this week’s reading assignment. John’s age-related changes [...]

Pages: 2

Words: 448

Essay

The Problems ESOL Teachers Face, Essay Example

Overview The current learning and teaching era stresses globalization; thus, elementary educators must adopt and incorporate multiculturalism and diversity in their learning plans. It is [...]

Pages: 8

Words: 2293

Essay

Should English Be the Primary Language? Essay Example

Research Question: Should English be the Primary Language of Instruction in Schools Worldwide? Work Thesis: English should be adopted as the primary language of instruction [...]

Pages: 4

Words: 999

Essay