Friday, January 31, 2020

Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words

Computer Ethics - Case Study Example On the other hand, if a computer professional or a group of professionals ask for ransom in exchange of not holding a computer as a hostage, they are indulging in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior. One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security software. Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the demand of ransom. Government can use both deterrent as well as preventive modes of legislation to counter the issue of ransomware. The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter computer hackers who use

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.