Preventing Cybercrime

Preventing Cybercrime

Preventing Cybercrime

Overview of Preventing Cybercrime in relation to cyber crime: [1]

Protection at Work or School

Although companies and schools provide some network-based protection for your computers and may require the use of specific security software and practices, they cannot stop you from doing something inadvertently that might expose information. If something goes wrong at work or school, you can call the help desk. Computer support people help keep your systems safe and functional. However, as individual users you are responsible and often held accountable for securing your computers and the data they contain. Users have always been the weakest link in computer security. At work, not only are you at risk from your own mistakes, you are at risk from what other users are doing as well. Many users access company or school networks from home with computer equipment not managed by your employer or school. Improperly managed computers provide an opportunity for cybercriminals to leverage weaknesses in home computers to attack the companies or schools to which you connect.

Resources

Notes and References

1. By Ben Woelk

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Privacy Rights Clearinghouse. (2005, April 20; updated 2005, May 8). A chronology of data breaches. Retrieved May 11, 2008, from https:// (internet link) privacyrights.org/ar/ChronDataBreaches.htm; America Online and the National Cyber Security Alliance. (2005). AOL/NCSA online safety study (December 2005). Retrieved May 11, 2008, from (internet link) staysafeonline.info/pdf/safety_study _2005.pdf; Caruso, J.B. (2006). Safeguarding the tower: IT security in higher education 2006: ECAR key findings. Retrieved May 11, 2008, from https://connect.educause.edu/ Library/ECAR/SafeguardingtheTowerITSec/41170; CERT Coordination Center. (2005). Before you connect a new computer to the Internet. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University. Retrieved May 11, 2008, from (internet link) cert.org/tech_tips/before_you_plug_in.html; RIT Information Security Office. (2006a, November). Accessing wireless networks safely: Protection without wires. Rochester, NY: Rochester Institute of Technology. Retrieved May 4, 2008, from https://security.rit.edu/docs/wireless-brochure.pdf; RIT Information Security Office. (2006b, November). Web browsing safely: Avoid ”getting caught” in the Web. Rochester, NY: Rochester Institute of Technology. Retrieved May 4, 2008, from https:// security.rit.edu/articles/webbrowsing.pdf; McQuade, S.C., III. Understanding and managing cybercrime. (2006). Boston: Pearson Education Inc.; Vijayan, J. (2007, March 29). TJX data breach: At 45.6M card numbers, it’s the biggest ever. Computerworld. Retrieved May 11, 2008, from (internet link) computerworld.com/action/ article.do?command=viewArticleBasic&articleId=9014782.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *