CYBER CRIMES & INFORMATION SYSTEMS SECURITY
Cyber Crimes or Computer Crimes are the crimes that are involved with a computer or a computer network. It can be described as criminal act on the internet which is also called as Net crime. Some Common crimes on the Internet are hacking, child pornography, copyright infringements, etc. They cause privacy problems, loss of confidential information, financial theft, etc., which are against cyber laws. Cyber-crimes can be classified into two groups such as the targeted crimes on computer networks or devices such us computer viruses, Denial of Services, Spy wares and Malwares and the crimes that are facilitated by computer networks and devices such as Cyber Stalking, Frauds, Information Warfare and Phishing.
Spam is the method of sending bulk emails for business purposes and some of them are unlawful in various levels. Computer Frauds are the criminal actives in cyber world like - altering passwords or inputs - destroying, altering, stealing outputs using unauthorized access – altering or destroying data – and misusing system tools and programs for fraudulent purposes. Cyber Warfare, Obscenities, Drug trafficking and Cyber Terrorism are against Cyber laws.
Information Systems Security is the security system to protect information systems from unlawful and unauthorized access, modification, deletions of data or records, inspection and recording. Information Systems security is focused on the guaranteed accessibility an operations of the computer systems without any problem and faults. In this modern age most of all the confidential information of the businesses, institutions and organizations are maintained and stored in electronic form in computers and the network systems for quick processing and transactions. The basic principles of these Information Systems Security are confidentiality, data integrity, availability, authenticity, and non-repudiation
Cryptography is a technique used for the Information System Security, that transforms the usable information or data in another form which cannot be understood by others or unauthorized users of the Information Systems. The transformed data can be transformed back to the original format using the cryptographic key, which is available only to authorized users. To protect the Information Systems, each component of the Systems should have a protection mechanism. Administrative Controls, Logical Controls and Physical Controls are the three types of controls which are based on the defense in depth approach. Different types of anti-virus, anti-spy ware and anti mal ware programs are available in market to protect computer systems and networks from cyber-crimes. Using up to date versions of these program will help people to protect information from viruses, hackers and all forms of Cyber Crimes.
Information Systems Securities play an important role in the security of Internet computers which provide the protection for data and information. Since the Cyber World is providing a large amount of information and transaction services the importance of these Information Security Systems is increasing day by day to fight and prevent the cyber-crimes.