Saturday, June 8, 2019
Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words
Computer Ethics - Case Study ExampleOn the other hand, if a figurer original or a group of professionals ask for ransom in exchange of not holding a computer as a warranter, they ar indulgence in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior.One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security sof tware. Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable affright that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an immaterial hard drive, the user will not have to give in to the demand of ransom.Government can use both deterrent as nearly as preventive modes of legislation to counter the issue of ransomware. The political sympathies should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to repeal hefty sanctions. Government can deter computer hackers who use
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment