Introduction to Computer Crimes
May 15, 2012
Cyber crime is the new breed of crime, which is either perpetrated using computers, or is otherwise related to the internet. Its origin can be traced to the growing dependence on computers in modern life in today’s society. Cyber crime has assumed criminal implications today as everything from microwave ovens and refrigerators to nuclear power plants is being run by or connected to computers. Today, the world is moving towards a point where everything from banking /stock exchanges, are traffic control, telephones to electric power, ...view middle of the document...
Potentially, everything from ordinary word processing software to customized computer programs designed for a specific company could work on a cloud computing system.
It is a good idea to rely on another computer system to run programs and store data as it would enable clients to access their applications and data from anywhere at any time as a backup. Hackers could access the cloud computing system using any computer linked to the Internet. Data would not be confined to a hard drive on one user's computer or even a corporation's internal network. Also, it could bring hardware costs down as the client would not need to buy the fastest computer with the most memory, because the cloud system would take care of the rest to save time. Instead, a person could buy an inexpensive computer terminal with a monitor, a keyboard and mouse and just enough processing power to run the middleware necessary to connect to the cloud system.
If the cloud system's back end is a grid computing system, then the client could take advantage of the entire network's processing power to take control of the system. Often, scientists and researchers work with calculations so complex that it would take many years for individual computers to complete them. On a grid computing system, the individual could send the calculation to the cloud for processing. The cloud system would tap into the processing power of all available computers significantly speeding up the calculation.
While the benefits of cloud computing seem convincing, security and privacy are perhaps the biggest concerns. The idea of handing over important or revelant data to another company worries some people. Corporate executives might hesitate to take advantage of a this type of system because it would not allow them to keep their company's information under lock and key.
The counterargument to this is that the companies offering cloud computing services live and die by their reputations. The benefits these companies to have reliable security measures in place are very important for business. Otherwise, the service would lose most or all of its clients. It's in their interest to employ the most advanced and accurate techniques to protect their clients' data. Cloud computing companies need to find ways to protect client privacy. One way is to use authentication techniques such as user names and passwords. Another is to employ an authorization format. There are a few standard hacker tricks that could cause in a cloud computing system, there is a significant workload shift. Instead of local computers, the network of computers that make up the cloud do all the heavy lifting when it comes to running all of the applications. This results in decrease of hardware and software demands on the computer. The only thing the user's computer needs to be able to run is the cloud computing systems interface software, which can be as simple as a search engine, and the cloud's network takes care of the rest.
Web- based e-mail...