A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Wednesday, June 4, 2014

Unauthorized use of computer system

Two risks related to network and the internet are unauthorized access and unauthorized use. The unauthorized use of computer systems and networks can be called time and resource theft.

Access control systems are used to control access to a computer, network or other resource.

Unauthorized can occur even if the user is authorized to access that computer or network but is not authorized for that particular activity.

This include possessed knowledge access systems that use password or other types of possessed knowledge; possessed object access systems  that use physical objects and biometric access system.

For employees of some companies, checking personal e-mail at work might be classified as unauthorized use.

The unauthorized use, access, modification and destruction of hardware, software, data or network resource is defined as computer crime by the Association of Information Technology Professionals.
Unauthorized use of computer system 

The Most Popular Posts

  • Genghis Khan, born Temujin in 1162 on the Mongolian steppes, remains one of history's most transformative figures. As the founder of the Mongol Empire, the...
  • Mangosteen juice, derived from the tropical fruit mangosteen, is renowned for its exceptional antioxidant content. Antioxidants are vital compounds that ne...
  • Secondary metabolites are an extraordinary array of organic compounds synthesized by plants that go beyond basic physiological processes like growth, dev...