top of page

Logical Methods

In this section I am going to be talking about the logical methods of fighting crime in ICT. A logical method is any computer-based method that can be used to help secure a system. Usernames and passwords are one example of a logical method. Other methods include using firewalls and encryption. Firewalls act as a gateway between the outside world and a system.  It dictates what data gets in and what data is allowed to leave. Its a hardcore barrier that many hackers love to try and get through.

 

Encryption doesn’t stop data being stolen it aims at confusing the person who tries to read the data. It uses algorithms to scramble plain text into encrypted text.  To unscramble the encryption you need to have the ‘key’ to unlock the encryption. Encryptions can be broken but by using heavy encryptions can mean it takes someone a very long time to break it by the time they do perhaps the data is no longer relevant. 

 

Auditing is also another tool in preventing crimes well its more used for detecting crimes quickly. As you use a system you leave a trail of ‘logs’ in your wake when you logged in, what applications you used and when you are at work you usually do certain things and certain times. If your account logs in at strange times that doesn’t fit your usual pattern the auditing software might flag this as being suspicious it could mean someone else has logged in using your account details. The next few pages look at the different 'logical' methods that can be used to ensure the security of ICT systems and data. Logical in this case means computer-based methods that can be put in place by the network or system administrator. They include:

  • backups

  • firewalls

  • encryption

  • software patches/updates

  • anti-virus and anti-spyware software

  • access rights

  • auditing

  • user IDs and passwords

bottom of page