Describe the following methods of detection and protection of computer
crimes:
Answer:
i)Audit trial: It is a thorough study done on an information system by
experts to identify any loophole that can be used to illegally access the system.
ii)Log files: These are system files that are installed in a computer to maintain a
record of how the system is being used.
iii)Data encryption: It is mixing up data in a way that only the sender and the
receiver are able to understand. This process is known as ciphering and the
text that is encrypted is referred to as cipher text.
iv)Biometric security: It is a form of access control measure that takes the
user’s attributes such as fingerprints and facial recognition. Unrecognized
users are denied access.
v)Security patch: A piece of code that is added to software so as to enhance
its security feature.