You are on page 1of 2

1 Why computer crimes are hard to protect? Explain.

What is computer crime.


Computer crime is an act performed by a knowledgeable computer user,
sometimes referred to as a hacker that illegally browses or steals a company's
or individual's private information. In some cases, this person or group of
individuals may be malicious and destroy or otherwise corrupt the computer or
data files.
Why computer crimes are hard to protect?
Computer-based crimes are harder to detect. Even if you manage to catch them, it is sometimes even harder to find
the criminal. With physical crimes, usually, the attacker must be at the exact location as the victim. With the computer
ones, this is not true. Your attacker can be on the other side of the World and still can steal your data. But let me list
some reasons why computer crimes are harder to protect and detect.

 The Internet: The global network converted our disconnected World into a small village, where everyone
connects to everyone else. The average time for sending packets between any two places in the World Wide
Web is around 50ms. Much faster than traveling to the location.
 Computer Complexity: Computers are pretty complex beasts. There are thousands of different subsystems
which can be an attack vector for our attacker. With so many security holes, they are pretty hard to defend. Plus,
the software and hardware landscape is changing rapidly, and something working Today will not work
Tomorrow.
 Many Privacy Tools: Computer criminals can use the same set of privacy-oriented software applications
used by ordinary people. Unfortunately, these people usually are much more technically adept than the average
computer user. Computer users are fighting versus a better-trained enemy.
 Malware Scalability: Like the rapid scale of different software products, malware can spread itself at the
same speed. In a matter of hours, a well-designed malware can affect thousands or even millions of computers.
2 How to protect software theft? Describe briefly.

 defensive techniques, which you can use to protect your software:

 Digital rights management (DRM): Probably the oldest method of keeping


your software safe. DRM uses different techniques to make sure people can not
redistribute your software..
 Hybrid application approach: You can make part of your application SaaS-
based. This way, you can move part or all of your core logic into the cloud and use
RPC-based methods to access it.
 Freemium model: You can use the hybrid approach with the so-named
freemium model. You can offer your customers a free version of your application
with locked features.
 Open Source: These days, many software vendors prefer to give a completely
free copy of their software and offer paid enterprise support. This way, there is no
point in stealing the software. If you want to support, you pay. In any case,
software thieves will not need help with using your application.
 Other way to protect software theft.
 To protect media from being stolen, owners should keep original software boxes in a secure
location. 
 All computer users should backup their files regularly.
 Escort terminated employees immediately to protect their software’s and programs (in big
companies)
 Software manufacturers issue users license agreement. A license agreement is the right to
use software. The most common type of license is single-user license agreement or known
as end-user license agreement (EULA)
 Give or sell the software to another individual, but only if the software is removed from the
user’s computer first.

You might also like