Computer crime is increasing at a higher rate in our society. Many government agencies and private corporations rely on the services provided by communication networks and computers. When large amounts of data are stored in the electronic form they are vulnerable to different kinds of threats than when they exist in manual form (Laudon & Laudon, 2006). In essence, the most common threats against modern information systems stem from technical, organizational, and environmental factors compounded by poor management. Due to this, proper prevention measures must be taken in order to protect computers and the data that are kept in them.
Therefore, the following paragraphs describe the various prevention tools and procedures that are being followed in relation to computer crime; these measures include Intrusion Detection Systems (IDS), antivirus systems, firewalls, access control, using security service providers, and implementing the filtering software.
Government agencies are in the fight against computer crimes through the implementation of the Computer Emergency Response Team (CERT), which response to network security breaches and monitor systems for emerging threats (Stair & Reynolds, 2006). Law enforcement departments are on the move to stop criminal hackers through the enactment of laws and policies that help eliminate computer crimes. Since private corporations rely on government policies, they also incorporate security policies that are cost-effective to the corporate image.
The intrusion detection system (IDS) can be installed by a company in order to monitor network resources with the aim of protecting against suspicious network traffic and attempts to access files and databases. This system supplements the firewalls, which is a combination of hardware and software that controls the flow of incoming and outgoing network traffic. Firewalls can be used to protect one part of the firm’s network from the rest of the network. In addition, there are antivirus systems that guard against computer viruses. Since viruses pose a major threat to the installed applications and stored data, private agencies provide their computers with antivirus software that is updated to counter the threats.
In the context of access control, organizations use specialized hardware and software devices, such as encryption devices, biometrics, and the public key infrastructure to encode data and information to help prevent unauthorized use. More so, access is much controlled when there are authentication policies. Laudon and Laudon (2006) assert that authentication is often established by using passwords known only to authorized users; this prevents the misuse of computer resources and enhances accountability.
Consequently, companies are taking the advantage of outsourcing their network security operations. In this light, managed security services (MSSPs) such as Guardent, and Symantec offers network security to a firm’s hardware and software at a more optimum cost. Moreover, companies are joining together to fight crime. The Software Publisher’s Association (SPA) and the Business Software Alliance (BSA) are antipiracy organizations that are formed through policies and procedures that maintain software quality. On the other hand, companies provide filtering software to help prevent Internet content. This policy helps prevents ethical crimes by restricting children or unauthorized individuals from accessing certain web contents and sending private information (Stair & Reynolds, 2006).
In conclusion, government agencies and private corporations need to implement proper security policies since they have very valuable information assets to protect. Crime-fighting procedures usually require additional controls on the information system. Before designing and implementing controls, organizations must consider the types of computer-related crimes that might occur, their consequences, and their cost. Thus, the most effective measures include installing antivirus software, firewalls, and intrusion detection systems, and outsourcing internet security operations. As explained in the previous paragraphs, these procedures are more efficient, since they positively influence the corporate objective of an organization in relation to the security of data.
References
Laudon, K. C., & Laudon, J. P. (2006). Management Information Systems: Managing the Digital Firm. (9th Ed). Upper Saddle River, NJ: Pearson Prentice Hall.
Stair, R.M., & Reynolds, G. W. (2006). Fundamentals of information systems. (3rd Ed.). Boston: Thompson Course Technology.