Categories of computer related crime
Computer related crime refers to the use of computer and software for illegal purposes. They
include:
1) Trapdoors
This is an undocumented entry point into a computer system It is not founding design
specifications but may be put in by software developers to enable them to bypass access
controls while working on anew piece of software. In this case, a secret special response
can be entered and to bypass controls and access confidential information
2) Logic bombs
This refers to a piece of code triggered by certain events. For example a program will
behave normally until a certain event occurs. For example, when disk utilisation reaches a
certain percentage and thus activates the large bomb which then maximises damage.
3) Time bombs
These are similar to large bombs except that they are triggered at a certain date.
4) Electronic eavesdropping
This refers to tapping without authorisation into communication line say a network cable
over which computer data and messages are transmitted.
5) Trojans
This is a program installed in a computer that performs one function while secretly
carrying out another. For example, a program could be running a computer game while
simultaneously destroying a data file or another program. Trojans may be used to cover
illegal activities or facilitate the destruction of certain vital information.
gregorymasila answered the question on November 30, 2017 at 12:46
- Everything an expert system can do, a decision support system (DSS) can also do?. Discuss any four grounds that consistently support or disapprove this statement....(Solved)
Everything an expert system can do, a decision support system (DSS) can also do.
Discuss any four grounds that consistently support or disapprove this statement.
Date posted: November 30, 2017. Answers (1)
- Whenever a user buys a software, it is essential that the software comes with a seller maintenance contract. As an outside consultant, you are required...(Solved)
Whenever a user buys a software, it is essential that the software comes with a seller
maintenance contract. As an outside consultant, you are required to explain to the user what
a seller maintenance contract is and the specifications required by the user in a seller
maintenance contract.
Date posted: November 30, 2017. Answers (1)
- Most users interact with their computer systems through a command-driven interface or graphical interface. As a person in charge of Information Technology (IT), your...(Solved)
Most users interact with their computer systems through a command-driven interface or
graphical interface. As a person in charge of Information Technology (IT), your boss is
proposing that you move away from the command driven interface you are currently
using, to a new platform which is object-based and has appealing interface as well as
being more user friendly.
What advise might you offer your boss regarding this proposal
Date posted: November 30, 2017. Answers (1)
- Without proper consideration of the behaviour of people in the business organisation setting even the best technically designed system is likely to fail.Required: (a) Analyse the...(Solved)
Without proper consideration of the behaviour of people in the business organisation setting
even the best technically designed system is likely to fail.
Required:
a) Analyse the most common reasons that may lead to resistance to the introduction of
Management Information Systems and how an organisation can overcome it.
Date posted: November 30, 2017. Answers (1)
- Change is inevitable. Change occurs in many ways and adapting to change is a primary management responsibility. Identify the factors, which bring about change in anorganisation....(Solved)
Change is inevitable. Change occurs in many ways and adapting to change is a primary
management responsibility. Identify the factors, which bring about change in an
organisation.
Date posted: November 30, 2017. Answers (1)
- The widespread use of computers in offices have raised major health and safety issues. Describe three major health related problems that may result from intensive...(Solved)
The widespread use of computers in offices have raised major health and safety issues.
Describe three major health related problems that may result from intensive computer use
and list three products that may be made available to improve the working conditions of
personnel using computers.
Date posted: November 30, 2017. Answers (1)
- Distinguish between online and offline transactions(Solved)
Distinguish between online and offline transactions.
Date posted: November 30, 2017. Answers (1)
- Describe any three basic strategies that an organisation can employ to obtain competitive advantage and illustrate the role of Information Technology in each case(Solved)
Describe any three basic strategies that an organisation can employ to obtain competitive advantage and illustrate the role of Information Technology in each case.
Date posted: November 30, 2017. Answers (1)
- Name six guidelines required for the development of new information systems.(Solved)
Name six guidelines required for the development of new information systems.
Date posted: November 30, 2017. Answers (1)
- Explain the meaning of the following terms, bringing out clearly the distinction between the terms in each pair (i) Unit testing and systems testing(Solved)
Explain the meaning of the following terms, bringing out clearly the distinction between the
terms in each pair.
i) Unit testing and systems testing.
ii) Preventive and perfective maintenance.
iii) Co-processing and parallel processing.
iv) Logical and physical design of a system.
Date posted: November 30, 2017. Answers (1)
- Write short descriptive notes on the following: (a) Electronic Data Interchange (b) Client/server computing (c) System specification (d) Electronic point of sale system...(Solved)
Write short descriptive notes on the following:
a) Electronic Data Interchange
b) Client/server computing
c) System specification
d) Electronic point of sale system
Date posted: November 30, 2017. Answers (1)
- Systems walkthroughs are procedures that are commonly used as a means of quality assurance in the information systems development process.Required: (i) Describe the composition and the...(Solved)
Systems walkthroughs are procedures that are commonly used as a means of quality
assurance in the information systems development process.
Required:
i) Describe the composition and the roles of walk through teams.
ii) Provide a checklist of items to be examined during the walkthrough.
Date posted: November 30, 2017. Answers (1)
- Explain what is meant by a Graphical User Interface (GUI) and account for the increased design and implementation of such interfaces(Solved)
Explain what is meant by a Graphical User Interface (GUI) and account for the increased design and implementation of such interfaces.
Date posted: November 30, 2017. Answers (1)
- Client/Server architecture, database technology and networks provide structures which facilitate sharing of corporate data and information.As an information Technology (IT) specialist, outline the major precautions...(Solved)
Client/Server architecture, database technology and networks provide structures which
facilitate sharing of corporate data and information.
As an information Technology (IT) specialist, outline the major precautions that should be
taken into account in the process of sharing data.
Date posted: November 30, 2017. Answers (1)
- Describe the relevance of the following to a Decision Support System (DSS):(i) Specialized packages: (ii) Query languages; (iii) Database management system(Solved)
Describe the relevance of the following to a Decision Support System (DSS):
(i) Specialized packages;
(ii) Query languages;
(iii) Database management system
Date posted: November 30, 2017. Answers (1)
- Management Information Systems should facilitate decision-making at all levels of management. Each level requires information with different characteristics and with differing degree of profitability.(Solved)
Management Information Systems should facilitate decision-making at all levels of management.
Each level requires information with different characteristics and with differing degree of
profitability.
Required:
a) Examine the characteristics of information used in (i) strategic planning and (ii) operational
control.
Date posted: November 30, 2017. Answers (1)
- Business process re-engineering (BPR) is the fundamental rethinking and radical redesign of business process to achieve a dramatic improvement in measures of performance such as...(Solved)
Business process re-engineering (BPR) is the fundamental rethinking and radical redesign of
business process to achieve a dramatic improvement in measures of performance such as
quality, cost, speed and services.
Required:
i) List the steps of BPR.
ii) Critically examine the role information technology (IT) plays in BPR
Date posted: November 30, 2017. Answers (1)
- The general manager of a large organisation has asked you to draw up a document identifying eight important system characteristics against which managers can evaluate...(Solved)
The general manager of a large organisation has asked you to draw up a document
identifying eight important system characteristics against which managers can evaluate the
success of an information system together with a brief explanation of each. What would
your document contain?
Date posted: November 30, 2017. Answers (1)
- Selling of products, services and information via the computer networks including the internet.Required: (a) Brief explanation of the following concepts as relates to e-commerce: (i) Electronic market....(Solved)
Selling of products, services and information via the computer networks including the internet.
Required:
a) Brief explanation of the following concepts as relates to e-commerce:
i) Electronic market.
ii) Electronic purse.
iii) Cyber banking.
iv) Cyber mall.
Date posted: November 30, 2017. Answers (1)
- Most systems are obsolescent the day they become operational. Comment on this statement giving six key reasons why changes to a system are so often...(Solved)
Most systems are obsolescent the day they become operational. Comment on this statement giving six key reasons why changes to a system are so often necessary after it has been implemented.
Date posted: November 29, 2017. Answers (1)