Wednesday, April 17, 2019
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words
Computer Ethics - Case Study ExampleOn the other hand, if a information processing system professional or a group of professionals ask for ransom in exchange of non holding a computer as a hostage, they are indulging in criminal behavior. deliver in previous years used to be gained by kidnapping an individual and this activity was recognize as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is pull down recognized as criminal behavior.One way through which computer users burn down protect their computers from world attacked by ransomware is by protecting their computers with certificate software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is necessity for the security software to remain up-to-date because new forms and software of ransomware are being launched every mean solar day and in order to tackle updated viruses, a computer needs updated security software. Another way of preventing become a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the dismissal of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the deal of ransom.Government can use both deterrent as well as preventive modes of jurisprudence to counter the issue of ransomware. The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter compu ter hackers who use
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.