Question? Call Us  +1 (817) 546-4770

BIT244 IT And Business Fraud For Virus And Worms

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

BIT244 IT And Business Fraud For Virus And Worms

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

BIT244 IT And Business Fraud For Virus And Worms

0 Download9 Pages / 2,086 Words

Course Code: BIT244
University: Central Queensland University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:
Select a topic from the topic list at the end of this document. Research your topic and write a report analysing the technical, social, legal aspects. For each topic your report will need to identify problems (or crimes) that may occur then recommend actions that can be taken to prevent the problem from occurring, identify the problem has occurred, what steps can be taken to remedy the problem, and  what actions can be taken towards the perpetrators of the problem. Reference original laws (e.g. common law) or court cases. Provide all references (Journals, web links, etc). Where possible, identify all laws applicable in each region (Australian-Pacific, Europe, America, and Asia).

Answer:
Introduction
A computer virus is program that is designed, such as corrupting the system or destroying data. It makes copies of itself first and then infects the program files or key areas of the system hard disks and floppy disks. A virus is spread usually without the knowledge of the user. A worm is also like a virus but it spreads by exploiting vulnerabilities in operating system or program. This can affect other computers by sharing or copying a file from an infected computer to another computer. The virus effect depends on how it is programmed as these virus and worms are software programs. There are certain anti-viruses that deal with these types of virus and worms and it is necessary to keep them updated. Due to these viruses in the system, the cyber-crimes related offences have been reported and the government had made many laws to prevent these types of crimes. In this report, it will discuss the legal implications of the offence relating to the virus and worms in Australia.
What is it?
The virus and worms that affect the computer operating system is the software program. The virus effect actually depends that how the virus has been programmed by the person. There are certain types of viruses that are designed with the operation of the computer to overwrite the boot sectors. Few viruses damage the computer memory and spread themselves to the computer, which results in picking up e-mail addresses and network addresses. Some viruses come through web source such as e-mail. The virus does not enter just by reading the plain text message. It has an encoded message containing embedded executable code or an attachment that include an executable file attachment. There are some types of viruses is the big threat for the societies these days such as ransomware. This encrypts the data by which the user cannot access the data. There are some other destructive programs such as Trojan horses and the network worms (Balthrop, Forrest, Newman, and Williamson, 2004). These types of programs have the main purpose is to masquerade as these programs induced the user to copy and share them with the friends. These are sometimes referred to as malicious software. These unauthorised users or malicious software system has gained access to the system through inadequate systems or security mechanism. These can also come through the holes in the application or the system and through the weak computer management (Cashell, Jackson, Jickling, Webel, 2004).
Legal Implications 
The computer virus has spread throughout Australia. In many countries like the USA and UK from a decade has a comprehensive jurisdiction for the computer crime legislation. In Australia, there is a very slow realisation of the danger of the computer crimes. In jurisdiction, there are very few legislation in relation to criminal offences, although there is legislation that deals with hacking related to unauthorised access (Mehta, Bartzis, Zhu, Clarke and Wing, 2006). The creation and distribution of virus in Australia has covered under several provisions of State legislation and the provision of Commonwealth.  In Crimes Act 1914, Part VIA, an offence relating to the computers had been inserted. There are only limited areas in Part VIA over which the Commonwealth has constitutional powers. Commonwealth provides section like 76D and 76E to operate or to create certain offences. These related to unauthorised access and damaging data in a commonwealth or computer. These provisions are applicable especially for those offences that deliberately spread the computer virus via email over the internet. It will be liable for the imprisonment up to 10 years or the fine of 1000 penalty units. New South Wales, the Crimes Act 1900 states under section 310 that whoever intentionally or deliberately introduced the virus into the circulation will be held liable for the act (Mishra, and Ansari, 2012).  
Few legal prosecutions are executed for spreading a computer virus in Australia. In Lynn v Barylak case, the defendant Barylak was the student of the Swinbourne Institute of Technology. The virus took place in the network of the computers in the laboratory. It has executed that the defendant has breached the policy of using in a rapid succession in a non-standard boot at four terminals. Under the Victorian legislation, the Barylak had been charged with two offences. The first offence he is charged with the computer trespass of the Summary Offence Act. This act states that without any lawful authority no one can gain access to the computer system or any part of the computer system. The second offence is the malicious damage under the Crimes Act occurs when a property of tangible nature belonging to another has been damaged by a person without any lawful excuse. The charged of computer trespass requires a necessary intention that had not been met and this was failed on this basis and the charge of malicious damage is not applicable as the defendant had given very innocent explanations for the behaviour (Alkaabi, Mohay, and Chantler, 2010).
The Victorian Parliament who does not believes and thinks it is necessary to have a specific legislation for the computer virus and they believe that criminal damage is enough to deal with these types of situation. Tasmania and the New South Wales had the same provision related to the computer viruses. In Western Australia and South Australia has the provisions related to the illegal operation of a computer system. However, in the Northern Territory, there are no laws related to the computer-related offences (Organisation for Economic Co-Operation and Development (OECD), 2009).
The Attorney general in the year 1987 found that it is required for the uniform legislation for the computer crime. There had been many proposals by the committee members for the offence of the computer crime as part of the criminal code. In all the states and the territories, it has the main aim is to standardise the criminal legislation. The mainly proposed offences are mainly grounded from the UK Act or the UK Misuse Act 1990. There is a slight difference between the UK Act and the code in a relation to the intention. In the UK Act, the damage had done requires an intention whereas in Australia the liability of the accused act recklessly (Szor, 2005).
What Can Companies Do?
In the digital world, the use of technology has increased and market is becoming more digitalized. This is resulting in increase in the risk of threats. These threats become the headache for the companies. The business either it is a small business or the medium business has the target to deal with the criminal’s hackers and scammers (James Cook University, 2018). The IT professionals in the companies are responsible to keep all the data, system and the networks to keep them safe. To deal with these types of threats that have mentioned above it is necessary for the companies to review their security measures and the procedures. The companies must adjust their policies and make strategies to deal with these types of situations. Here is a list of advice from that the companies can protect their business:

The companies to check the vulnerabilities in the system, they can start to do an audit of the whole systems, network, computer devices and the machines, required changes must be improved
There is a need to educate the employees by conducting seminars and workshops and keep your employees and staff informed about the threats, guide them about the organisation security policies and responding in such situations. This will create a security culture in the organisation
The companies must time to time update and the anti-virus software, anti-malware software and the firewall
It is necessary that the companies must input the necessary standard prompts on the networks infrastructure that is used to guard emails and the other devices such as mobiles
The computer systems and the network system are the physical assets that must be provided with the security as these physical thefts can allow the criminal to access the sensitive data and can put the threat in the system
The company must check an update in their system that is connected to the devices that can be a major cause of the data breach or the virus implications and it is required to upgrade and update all the printers and the connecting devices (Geer, 2006). 

What are governments doing?
Due to an increased number of cases of the cybercrimes the government has taken many steps to protect the society from these threats. There are certain laws that had been implemented by the government for those who do computer-related offences. In the year, 2001 the Cybercrime Act model had been diversified by the government to bring the uniformity in the law system (Hemidal Security, 2018). The governments had made many policies related to the computer virus and worms. They are educating the society about these types of threats in the society. The governments have also implemented and made compulsory for the companies to use the standard anti-virus and anti-malware software to protect the system from these threats (Australian Cyber Security Centre, 2018). The cybersecurity department of the country had already mentioned that the cybersecurity is the key for any company to function. The anti-virus companies with the good ratings had been allowed by the governments. To fight with computer viruses and worms the government had implicated certain rules and guidelines (Sprinkle, 2001). The government had worked with the private sector for the better understanding the impact of the Computer virus and worms. The Computer virus and worms had a wide impact on the economy for that the government is working to stop these threats. The government in a recent case had imposed with penalties and imprisonment for the offenders. The governments had imposed many Acts that are been successful to implement and had a wide legal implication on those who try to do unlawful acts or intentionally or deliberately insert a virus into the system.
Conclusion
It had been concluded that the computer virus and worms have increased widely due to that various threats had been increased. These threats had a high impact on the societies as it caused a lot of damage to the user. To stop these types of threats it becomes necessary for the individual and the companies to take proper measures and implications. It is necessary to keep an updated anti-virus and to keep a regular check of the system to be protected. There are certain laws that had been made to prevent these types of risks, but the risk has increased and it is required to make amendments and make a strong law to punish the criminals. The governments had made certain laws and guidelines to prevent the user to be prevented from these risks. In the end, it has been concluded that the risk of computer virus cannot be ignored and for the individuals, government and the companies are required to imply certain measures to prevent these risks. 
References 
Australian Cyber Securit Centre (2018) ASIC program and advice. [Online] ASIC. Available from: https://www.acsc.gov.au/ [Accessed 29/08/2018]
Cashell, B., Jackson, W., Jickling, M., Webel, B. (2004). “The Economic Impact of Cyber-Attacks.” CRS Report for Congress. The Library of Congress. Retrieved from https://archive.nyu.edu/bitstream/2451/14999/2/Infosec_ISR_Congress.pdf. 
Hemidal Security (2018) Cyber Security- guide to learn [Online] Hemidal Security. Available from:  [Accessed 29/08/2018]
James Cook University (2018). Computer Virus Guide [Online]. James Cook University. Available from: https://www.jcu.edu.au/information-and-communications-technology/secure-it/computer-virus-guide [Accessed 29/08/2018]
Mishra, B.K. and Ansari, G.M. (2012) Differential Epidemic Model of Virus and Worms in Computer Network. IJ Network security, 14(3), pp.149-155. 
Organisation for Economic Co-Operation and Development (OECD). (2009). “Computer Viruses and Other Malicious Software: A Threat to the Internet Economy.” Retrieved from: DOI:10.1787/9789264056510-en. 
Balthrop, J., Forrest, S., Newman, M.E. and Williamson, M.M., (2004). Technological networks and the spread of computer viruses. Science, 304(5670), pp.527-529.
Szor, P. (2005) The art of computer virus research and defense. Pearson Education.
Mehta, V., Bartzis, C., Zhu, H., Clarke, E. and Wing, J., (2006) Ranking attack graphs. In International Workshop on Recent Advances in Intrusion Detection (pp. 127-144). Springer, Berlin, Heidelberg.
Sprinkel, S.C. (2001) Global Internet Regulation: The Residual Effects of the ILoveYou Computer Virus and the Draft Convention on Cyber-Crime. Suffolk Transnat’l L. Rev., 25, p.491.
Geer, D. (2006). Security of critical control systems sparks concern. Computer, 39(1), pp.20-23.
Alkaabi, A., Mohay,. and Chantler, N. (2010) Dealing with the problem of cybercrime. In International Conference on Digital Forensics and Cyber Crime (pp. 1-18). Springer, Berlin, Heidelberg.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 9 pages

PAY 6 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). IT And Business Fraud For Virus And Worms. Retrieved from https://myassignmenthelp.com/free-samples/bit244-it-and-business-fraud/security-measures.html.

“IT And Business Fraud For Virus And Worms.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bit244-it-and-business-fraud/security-measures.html.

My Assignment Help (2021) IT And Business Fraud For Virus And Worms [Online]. Available from: https://myassignmenthelp.com/free-samples/bit244-it-and-business-fraud/security-measures.html[Accessed 18 December 2021].

My Assignment Help. ‘IT And Business Fraud For Virus And Worms’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. IT And Business Fraud For Virus And Worms [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/bit244-it-and-business-fraud/security-measures.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

Are you tired of getting negative comments repeatedly on your assignment in spite of working hard so much? If you are unable to understand where you are going wrong, it means you need professional assignment assistance. Signup with MyAssignmenthelp.com now to have top experts by your side. Our active chat support will not make you wait for long. They will assign the best writer in your subject who can solve your queries like assignment help Sydney.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

PROJ6016 Employer Based Project

Free Samples PROJ6016 Employer Based Project .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PROJ6016 Employer

Read More »

PPMP20009 Marking Rubric

Free Samples PPMP20009 Marking Rubric .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} PPMP20009 Marking Rubric

Read More »