answersLogoWhite

0


Best Answer

Passwords help to combat computer crime by placing another layer of protection against immediate access. Depending on the complexity of the password, a password may prevent access to a computer thereby preventing a crime for days or even weeks while attempts are made to crack the password.

User Avatar

Wiki User

9y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

10y ago

Encryption protects data by obscuring the real (so-called plaintext) data with a cypher such that only authorised people or machines, those in posession of the encrpytion key, can convert the cypher back to plaintext.

This combats computer crime by protecting the plaintext data.

For example, if a criminal organization or government would intercept electronic communications without express permission, it could not generally decipher the encrypted plaintext.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

An IDS can combat computer crime in two ways - prevention and detection. When an IDS lights off an alert that a suspected intrusion is occuring, a user or system administrator can start taking actions to counteract the intrusion - severing the connection, diverting it, backing up files, changing security settings etc. Logs from an IDS can also identify areas where security needs to be improved in order to better protect a system.

The logs from an IDS can also provide valuable information that may be used to track back to the miscreant who launched the attack or comitted the crime and thus bring them to justice. Making use of the logs may require considerable sophistication and skills.

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How can intrusion-detection systems combat computer crime?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How can backups combat computer crime?

mxm bis mara


How anti viruses combat computer crime?

They prevent the files from viruses especially in files or documents the anti-viruses combat computer crime by attacking the viruses which they want to steal the files or money from banks


How passwords combat computer crime?

Passwords help to combat computer crime by placing another layer of protection against immediate access. Depending on the complexity of the password, a password may prevent access to a computer thereby preventing a crime for days or even weeks while attempts are made to crack the password.


What is antivirus software and how it can be used to combat crime?

AntiVirus Software is a program that deletes harmful files on your computer that can be used to keep track of your keystrokes, delete files off of your computer, or send personal files to another person's computer. These programs can be used to combat computer crime because it's deleting files that could be used to gain access to personal information.


What does computer forensics use computer systems and technology for?

Mainly matching date from a particular crime with data in large data bases.


What is a combat?

To fight or contend against; oppose vigorously: to combat crime.


How do bounties combat computer crime?

bountiesbounties are hackers who are sabotaging information in computers. They do this by applying firewall, passwords, encryption, audit trail etc in order to trace who ever was using the computer.


What is the computer impact on crime?

can you please tell me impact of computer on crime? can you please tell me impact of computer on crime? can you please tell me impact of computer on crime? can you please tell me impact of computer on crime?


What are different crime reporting measuring systems?

different crime reporting measuring systems


Who is a Computer Crime Investigator?

Computer Crime Investigator is a person who investigates cyber crime


Define computer crime?

Computer crime generally refers to criminal activity where a computer or a network of computer is used to commit the crime


How has computer crime been characterized in the past?

Computer crime has been defined as 'any illegal act fostered or facilitated by a computer, whether the computer is an object of a crime, an instrument used to commit a crime, or a repository of evidence related to a crime'