The number of computer crime (computer crime), especially those related to information systems, will continue to rise due to several things, among others:
• Business applications that use (based) information technology and computer networks has increased. For example, the current emerging business applications such as on-line banking, electronic commerce (e-commerce), Electronic Data Interchange (EDI), and many more.
Even e-commerce applications will be one driver applications in Indonesia (through the "Telematics Indonesia" and Nusantara 21). Similarly, in various corners of the world looks ecommerce applications began to increase.
Even e-commerce applications will be one driver applications in Indonesia (through the "Telematics Indonesia" and Nusantara 21). Similarly, in various corners of the world looks ecommerce applications began to increase.
• Decentralization (and distributed) servers cause more systems must be addressed. It requires more skilled operators and administrators are also likely to be deployed in all locations. While looking for a reliable operator and administrator is very difficult.
• Transition from single to multi-vendor vendor so that more systems or devices that must be understood and the problem of interoperability between vendors is more difficult to handle. Unstuck understand one type of device from one vendor alone is difficult, let alone have to deal with different kinds of devices.
• Increased capability in the field of computer users that start a lot of users who try to play or dismantle the system he uses (or other people's systems). If the first access to a computer is very difficult, so now the computer is an item that easily obtained and installed in many schools and homes.
• Easily available software to attack computers and computer networks. Many places on the Internet that provides software can be retrieved directly (downloaded) and immediately used to attack unstuck with Graphical User Interface (GUI) is easy to use. Some programs, such as SATAN, even just need a web browser to run it. Thus, someone who can use a web browser that can run programs attacker (attack).
• The difficulty of law enforcement to pursue the world of computers and telecommunications progress very fast. Law-based space and time will have difficulty to cope with problems that actually occur in a system that does not have the space and time.
• The more complex the digunakan1 system, such as the size of the program (source code) that is used so that the greater the probability of security holes (caused by programming errors, bugs).
• More and more companies are linking its information systems with a global computer network like the Internet. This opens up access from around the world. (The purpose of this access is as targeted as well as the attacker.) Potential of information systems that can be uprooted from everywhere to be larger.
No comments:
Post a Comment