Tuesday, April 23, 2019

1.Appreciate important issues in computer system design such as speed Essay

1.Appreciate important issues in information processing system system concept such as speed and flexibility and be able to demonstrate an understanding of the organisational principles of current computer systems - Essay ExampleIn the mid 1970s when the personal computer was not as commons as the current times, computing attacks were done on the telephone systems for example John Draper hacked the AT&T system to make free long distance calls. Randy (2009) pointed out that he achieved to get with the respective system by a simple whistle which he got in a metric grain box. Later, he came to be known as Captain Krunch. Different types of attacks cast been witnessed over the years and have gotten more sophisticated with the advent of new technology.By the end of 1970s, personal computers became comparatively more hearty than earlier. This marked the start of email emails first spam email was sent in 1978 on ARPAnet by the CEO of Digital Equipment Corporation to disable a new com puter. The spam in those times chiefly consisted of advertisements or promotions unlike the financial gain objectives that are hidden in them now. The current motives behind spam deal with far more severe aspects for e.g. indistinguishability frauds, online scams. Personal email addresses databases are maintained by many companies these days. Spam is sent to these pass receivers without their consent or permission with the alias of different forms to make them assist professional. These kinds of spam emails transformed into phishing by the year 1996 and consisted of content like the announcement of winning of a lottery by the recipient or an official letter from his respective bank to update his personal details. The recipient enters his personal information in response, thinking that it is a genuine banking process. The email scammer gains the recipients personal information as well as banking information that can be used in any desired malicious activity.The stealing of person al information has led to the most appalling of the cyber crimes which is identity theft. According to the statistics provided by the Javelin Strategy & Research Center

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.